:facetid:stream:\"streams/conf/hase\"OK:facetid:stream:streams/conf/haseMorayo AdedjoumaNataliya YakymetsA Framework for Model-Based Dependability Analysis of Cyber-Physical Systems.HASE82-892019Conference and Workshop Papersclosedconf/hase/AdedjoumaY1910.1109/HASE.2019.00022https://doi.org/10.1109/HASE.2019.00022https://dblp.org/rec/conf/hase/AdedjoumaY19URL#2171846Bader AlahmadSathish GopalakrishnanIsochronous Execution Models for High-Assurance Real-Time Systems.HASE66-732019Conference and Workshop Papersclosedconf/hase/AlahmadG1910.1109/HASE.2019.00020https://doi.org/10.1109/HASE.2019.00020https://dblp.org/rec/conf/hase/AlahmadG19URL#2171847Faisal A. AlkhaldiAli T. AlouaniDevelopment of a Generic Model for Large-Scale Healthcare Organizations.HASE200-2072019Conference and Workshop Papersclosedconf/hase/AlkhaldiA1910.1109/HASE.2019.00038https://doi.org/10.1109/HASE.2019.00038https://dblp.org/rec/conf/hase/AlkhaldiA19URL#2171848Richardson AndradeNelson S. RosaMidSecThings: Assurance Solution for Security Smart Homes in IoT.HASE171-1782019Conference and Workshop Papersclosedconf/hase/AndradeR1910.1109/HASE.2019.00034https://doi.org/10.1109/HASE.2019.00034https://dblp.org/rec/conf/hase/AndradeR19URL#2171849Yoshitaka ArahoriRangeLocker: Adaptive Range-Sensitive Lockset Analysis for Precise Dynamic Race Detection.HASE184-1912019Conference and Workshop Papersclosedconf/hase/Arahori1910.1109/HASE.2019.00036https://doi.org/10.1109/HASE.2019.00036https://dblp.org/rec/conf/hase/Arahori19URL#2171850Frédéric BoniolClaire PagettiNathanaël SensfelderIdentification of Multi-Core Interference.HASE98-1062019Conference and Workshop Papersclosedconf/hase/BoniolPS1910.1109/HASE.2019.00024https://doi.org/10.1109/HASE.2019.00024https://dblp.org/rec/conf/hase/BoniolPS19URL#2171851Jeremy W. BryansHoang Nga NguyenSiraj A. ShaikhAttack Defense Trees with Sequential Conjunction.HASE247-2522019Conference and Workshop Papersclosedconf/hase/BryansNS1910.1109/HASE.2019.00045https://doi.org/10.1109/HASE.2019.00045https://dblp.org/rec/conf/hase/BryansNS19URL#2171852Nacha ChondamrongkulJing Sun 0002Bingyang WeiIan WarrenParallel Verification of Software Architecture Design.HASE50-572019Conference and Workshop Papersclosedconf/hase/ChondamrongkulS1910.1109/HASE.2019.00018https://doi.org/10.1109/HASE.2019.00018https://dblp.org/rec/conf/hase/ChondamrongkulS19URL#2171853Samip DhakalFehmi JaafarPavol ZavarskyPrivate Blockchain Network for IoT Device Firmware Integrity Verification and Update.HASE164-1702019Conference and Workshop Papersclosedconf/hase/DhakalJZ1910.1109/HASE.2019.00033https://doi.org/10.1109/HASE.2019.00033https://dblp.org/rec/conf/hase/DhakalJZ19URL#2171854Ulrich Thomas GaborChristoph-Cordt von EgidyOlaf SpinczykInterface Injection with AspectC++ in Embedded Systems.HASE131-1382019Conference and Workshop Papersclosedconf/hase/GaborES1910.1109/HASE.2019.00028https://doi.org/10.1109/HASE.2019.00028https://dblp.org/rec/conf/hase/GaborES19URL#2171855Mohamad GharibPaolo LolliniAndrea CeccarelliAndrea BondavalliEngineering Functional Safety Requirements for Automotive Systems: A Cyber-Physical-Social Approach.HASE74-812019Conference and Workshop Papersclosedconf/hase/GharibLCB1910.1109/HASE.2019.00021https://doi.org/10.1109/HASE.2019.00021https://dblp.org/rec/conf/hase/GharibLCB19URL#2171856Alexei IliasovAlexander B. RomanovskyLinas LaibinisQuantitative Validation of Formal Domain Models.HASE17-242019Conference and Workshop Papersclosedconf/hase/IliasovRL1910.1109/HASE.2019.00013https://doi.org/10.1109/HASE.2019.00013https://dblp.org/rec/conf/hase/IliasovRL19URL#2171857Natasha JarusSahra Sedigh SarvestaniAli R. HursonFormalizing Cyber-Physical System Model Transformation Via Abstract Interpretation.HASE107-1142019Conference and Workshop Papersclosedconf/hase/JarusSH1910.1109/HASE.2019.00025https://doi.org/10.1109/HASE.2019.00025https://dblp.org/rec/conf/hase/JarusSH19URL#2171858Edwin Franco Myloth JosephlalSridhar AdepuVulnerability Analysis of an Automotive Infotainment System's WIFI Capability.HASE241-2462019Conference and Workshop Papersclosedconf/hase/JosephlalA1910.1109/HASE.2019.00044https://doi.org/10.1109/HASE.2019.00044https://dblp.org/rec/conf/hase/JosephlalA19URL#2171859Ryo KurachiHiroaki TakadaNaoki AdachiHiroshi UedaYukihiro MiyashitaAsymmetric Key-Based Secure ECU Replacement Without PKI.HASE234-2402019Conference and Workshop Papersclosedconf/hase/KurachiTAUM1910.1109/HASE.2019.00043https://doi.org/10.1109/HASE.2019.00043https://dblp.org/rec/conf/hase/KurachiTAUM19URL#2171860Honghui LiXiuru LiHuan WangJie ZhangZhouxian JiangResearch on Cloud Performance Testing Model.HASE179-1832019Conference and Workshop Papersclosedconf/hase/LiLWZJ1910.1109/HASE.2019.00035https://doi.org/10.1109/HASE.2019.00035https://dblp.org/rec/conf/hase/LiLWZJ19URL#2171861Haoran LiangLei SongXuzhi LiThe Rotate Stress of Steam Turbine Prediction Method Based on Stacking Ensemble Learning.HASE146-1492019Conference and Workshop Papersclosedconf/hase/LiangSL1910.1109/HASE.2019.00030https://doi.org/10.1109/HASE.2019.00030https://dblp.org/rec/conf/hase/LiangSL19URL#2171862Xiao Liu 0025Yufei JiangDinghao WuA Lightweight Framework for Regular Expression Verification.HASE1-82019Conference and Workshop Papersclosedconf/hase/LiuJW1910.1109/HASE.2019.00011https://doi.org/10.1109/HASE.2019.00011https://dblp.org/rec/conf/hase/LiuJW19URL#2171863Xiaodong LuKazuyuki MoriokaTadashi KogaYasuto SumiyaAir-Ground System Wide Information Management to Achieve Safe Flight Operation.HASE42-492019Conference and Workshop Papersclosedconf/hase/LuMKS1910.1109/HASE.2019.00017https://doi.org/10.1109/HASE.2019.00017https://dblp.org/rec/conf/hase/LuMKS19URL#2171864Kaikai PanDigvijay GusainPeter PalenskyModelica-Supported Attack Impact Evaluation in Cyber Physical Energy System.HASE228-2332019Conference and Workshop Papersclosedconf/hase/PanGP1910.1109/HASE.2019.00042https://doi.org/10.1109/HASE.2019.00042https://dblp.org/rec/conf/hase/PanGP19URL#2171865Giedre SabaliauskaiteLin Shen LiewFengjun ZhouJin CuiDesigning Safe and Secure Mixed Traffic Systems.HASE222-2272019Conference and Workshop Papersclosedconf/hase/SabaliauskaiteL1910.1109/HASE.2019.00041https://doi.org/10.1109/HASE.2019.00041https://dblp.org/rec/conf/hase/SabaliauskaiteL19URL#2171866Andreas SchörgenhumerMario KahlhoferPeter ChaluparPaul GrünbacherHanspeter MössenböckA Framework for Preprocessing Multivariate, Topology-Aware Time Series and Event Data in a Multi-System Environment.HASE115-1222019Conference and Workshop Papersclosedconf/hase/SchorgenhumerKC1910.1109/HASE.2019.00026https://doi.org/10.1109/HASE.2019.00026https://dblp.org/rec/conf/hase/SchorgenhumerKC19URL#2171867Lei SongHaoran LiangTaisheng ZhengReal-Time Anomaly Detection Method for Space Imager Streaming Data Based on HTM Algorithm.HASE33-382019Conference and Workshop Papersclosedconf/hase/SongLZ1910.1109/HASE.2019.00015https://doi.org/10.1109/HASE.2019.00015https://dblp.org/rec/conf/hase/SongLZ19URL#2171868Paulius StankaitisAlexei IliasovYamine Aït AmeurTsutomu KobayashiFuyuki IshikawaAlexander B. RomanovskyA Refinement Based Method for Developing Distributed Protocols.HASE90-972019Conference and Workshop Papersclosedconf/hase/StankaitisIAKIR1910.1109/HASE.2019.00023https://doi.org/10.1109/HASE.2019.00023https://dblp.org/rec/conf/hase/StankaitisIAKIR19URL#2171869Inna VistbakkaElena TroubitsynaAmin MajdMulti-Layered Safety Architecture of Autonomous Systems: Formalising Coordination Perspective.HASE58-652019Conference and Workshop Papersclosedconf/hase/VistbakkaTM1910.1109/HASE.2019.00019https://doi.org/10.1109/HASE.2019.00019https://dblp.org/rec/conf/hase/VistbakkaTM19URL#2171870Junjie Wang 0006Peng XuJinyang Li 0004Xiaoshan SunWenchong TianJie LingWei ZhengHengchang LiuTowards an Efficient Cyber-Physical System for First-Mile Taxi Transit in Urban Complex.HASE9-162019Conference and Workshop Papersclosedconf/hase/WangXLSTLZL1910.1109/HASE.2019.00012https://doi.org/10.1109/HASE.2019.00012https://dblp.org/rec/conf/hase/WangXLSTLZL19URL#2171871Rongkun YanJian GuoTiming Modeling and Analysis for AUTOSAR Schedule Tables.HASE123-1302019Conference and Workshop Papersclosedconf/hase/YanG1910.1109/HASE.2019.00027https://doi.org/10.1109/HASE.2019.00027https://dblp.org/rec/conf/hase/YanG19URL#2171872Tunde Akeem YekiniFehmi JaafarPavol ZavarskyStudy of Trust at Device Level of the Internet of Things Architecture.HASE150-1552019Conference and Workshop Papersclosedconf/hase/YekiniJZ1910.1109/HASE.2019.00031https://doi.org/10.1109/HASE.2019.00031https://dblp.org/rec/conf/hase/YekiniJZ19URL#2171873Jiaqi YinHuibiao ZhuYuan FeiYucheng FangModeling and Verifying Spark on YARN Using Process Algebra.HASE208-2152019Conference and Workshop Papersclosedconf/hase/YinZFF1910.1109/HASE.2019.00039https://doi.org/10.1109/HASE.2019.00039https://dblp.org/rec/conf/hase/YinZFF19URL#2171874Bo ZhangHaoming LiuJiajia SongJinbo ZhangSimulation on Grounding Fault Location of Distribution Network Based on Regional Parameters.HASE216-2212019Conference and Workshop Papersclosedconf/hase/ZhangLSZ1910.1109/HASE.2019.00040https://doi.org/10.1109/HASE.2019.00040https://dblp.org/rec/conf/hase/ZhangLSZ19URL#2171875Shuai Zhang 0012Wenxi ZengI-Ling YenFarokh B. BastaniSemantically Enhanced Time Series Databases in IoT-Edge-Cloud Infrastructure.HASE25-322019Conference and Workshop Papersclosedconf/hase/ZhangZYB1910.1109/HASE.2019.00014https://doi.org/10.1109/HASE.2019.00014https://dblp.org/rec/conf/hase/ZhangZYB19URL#2171876Hongyan ZhaoHuibiao ZhuYucheng FangLili XiaoModeling and Verifying Storm Using CSP.HASE192-1992019Conference and Workshop Papersclosedconf/hase/ZhaoZFX1910.1109/HASE.2019.00037https://doi.org/10.1109/HASE.2019.00037https://dblp.org/rec/conf/hase/ZhaoZFX19URL#2171877Junjun ZhengHiroyuki OkamuraTadashi DohiSecurity Evaluation of a VM-Based Intrusion-Tolerant System with Pull-Type Patch Management.HASE156-1632019Conference and Workshop Papersclosedconf/hase/ZhengOD1910.1109/HASE.2019.00032https://doi.org/10.1109/HASE.2019.00032https://dblp.org/rec/conf/hase/ZhengOD19URL#2171878Wei ZhihaoJianyuan LiWanqing Li 0003Mining Accompanying Passing-Vehicles to Discover Suspected Gangs.HASE39-412019Conference and Workshop Papersclosedconf/hase/ZhihaoLL1910.1109/HASE.2019.00016https://doi.org/10.1109/HASE.2019.00016https://dblp.org/rec/conf/hase/ZhihaoLL19URL#2171879Brad J. ZieglerSahra Sedigh SarvestaniAli R. HursonFacilitating Failure Analysis with Software Instrumentation.HASE139-1452019Conference and Workshop Papersclosedconf/hase/ZieglerSH1910.1109/HASE.2019.00029https://doi.org/10.1109/HASE.2019.00029https://dblp.org/rec/conf/hase/ZieglerSH19URL#2171880Dongjin YuVu Nguyen 0003Congfeng Jiang19th IEEE International Symposium on High Assurance Systems Engineering, HASE 2019, Hangzhou, China, January 3-5, 2019HASEIEEE2019Editorshipconf/hase/2019https://ieeexplore.ieee.org/xpl/conhome/8666668/proceedinghttps://dblp.org/rec/conf/hase/2019URL#2295520Amir Alipour-FanidMonireh DabaghchianHengrun Zhang 0001Kai Zeng 0001String Stability Analysis of Cooperative Adaptive Cruise Control under Jamming Attacks.HASE157-1622017Conference and Workshop Papersclosedconf/hase/Alipour-FanidDZ1710.1109/HASE.2017.39https://doi.org/10.1109/HASE.2017.39https://dblp.org/rec/conf/hase/Alipour-FanidDZ17URL#2925008Ron BitonClint FeherYuval EloviciAsaf ShabtaiGaby ShugolRaz TikochinskiShachar KurA Proxy-Based Solution for Securiting Remote Desktop Connections in Mission-Critical Systems.HASE153-1562017Conference and Workshop Papersclosedconf/hase/BitonFESSTK1710.1109/HASE.2017.38https://doi.org/10.1109/HASE.2017.38https://dblp.org/rec/conf/hase/BitonFESSTK17URL#2925009Quentin CappartChristophe LimbréePierre SchausJean QuilbeufLouis-Marie TraonouezAxel LegayVerification of Interlocking Systems Using Statistical Model Checking.HASE61-682017Conference and Workshop Papersclosedconf/hase/CappartLSQTL1710.1109/HASE.2017.10https://doi.org/10.1109/HASE.2017.10https://dblp.org/rec/conf/hase/CappartLSQTL17URL#2925010Qi Cheng 0002Kevin A. KwiatCharles A. KamhouaLaurent NjillaAttack Graph Based Network Risk Assessment: Exact Inference vs Region-Based Approximation.HASE84-872017Conference and Workshop Papersclosedconf/hase/ChengKKN1710.1109/HASE.2017.8https://doi.org/10.1109/HASE.2017.8https://dblp.org/rec/conf/hase/ChengKKN17URL#2925011Prakash Rao DunakaBruce M. McMillinCyber-Physical Security of a Chemical Plant.HASE33-402017Conference and Workshop Papersclosedconf/hase/DunakaM1710.1109/HASE.2017.23https://doi.org/10.1109/HASE.2017.23https://dblp.org/rec/conf/hase/DunakaM17URL#2925012Rem GenshAshur RafievAlexander B. RomanovskyAlessandro F. Garcia 0001Fei XiaAlex YakovlevArchitecting Holistic Fault Tolerance.HASE5-82017Conference and Workshop Papersclosedconf/hase/GenshRRGXY1710.1109/HASE.2017.13https://doi.org/10.1109/HASE.2017.13https://dblp.org/rec/conf/hase/GenshRRGXY17URL#2925013Mario GleirscherCarmen CârlanArguing from Hazard Analysis in Safety Cases: A Modular Argument Pattern.HASE53-602017Conference and Workshop Papersclosedconf/hase/GleirscherC1710.1109/HASE.2017.15https://doi.org/10.1109/HASE.2017.15https://dblp.org/rec/conf/hase/GleirscherC17URL#2925014Mario GleirscherStefan KugeleDefining Risk States in Autonomous Road Vehicles.HASE112-1152017Conference and Workshop Papersclosedconf/hase/GleirscherK1710.1109/HASE.2017.14https://doi.org/10.1109/HASE.2017.14https://dblp.org/rec/conf/hase/GleirscherK17URL#2925015Jonathan GohSridhar AdepuMarcus TanZi Shan LeeAnomaly Detection in Cyber Physical Systems Using Recurrent Neural Networks.HASE140-1452017Conference and Workshop Papersclosedconf/hase/GohATL1710.1109/HASE.2017.36https://doi.org/10.1109/HASE.2017.36https://dblp.org/rec/conf/hase/GohATL17URL#2925016Ismail Rizky HarlinHironori WashizakiYoshiaki FukazawaImpact of Using a Static-Type System in Computer Programming.HASE116-1192017Conference and Workshop Papersclosedconf/hase/HarlinWF1710.1109/HASE.2017.17https://doi.org/10.1109/HASE.2017.17https://dblp.org/rec/conf/hase/HarlinWF17URL#2925017Nghi HuynhMarc FrappierAmel MammarRégine LaleauVerification of SGAC Access Control Policies Using Alloy and ProB.HASE120-1232017Conference and Workshop Papersclosedconf/hase/HuynhFML1710.1109/HASE.2017.24https://doi.org/10.1109/HASE.2017.24https://dblp.org/rec/conf/hase/HuynhFML17URL#2925018Ali KansoNicolas DeixionneAbdelouahed GherbiFereydoun Farrahi MoghaddamEnhancing OpenStack Fault Tolerance for Provisioning Computing Environments.HASE77-832017Conference and Workshop Papersclosedconf/hase/KansoDGM1710.1109/HASE.2017.27https://doi.org/10.1109/HASE.2017.27https://dblp.org/rec/conf/hase/KansoDGM17URL#2925019Sanya KhruahongXiaoying KongKumbesan SandrasegaranLi Liu 0005Multi-Level Indoor Navigation Ontology for High Assurance Location-Based Services.HASE128-1312017Conference and Workshop Papersclosedconf/hase/KhruahongKSL1710.1109/HASE.2017.9https://doi.org/10.1109/HASE.2017.9https://dblp.org/rec/conf/hase/KhruahongKSL17URL#2925020Lov KumarSantanu Kumar RathAshish SurekaUsing Source Code Metrics and Multivariate Adaptive Regression Splines to Predict Maintainability of Service Oriented Software.HASE88-952017Conference and Workshop Papersclosedconf/hase/KumarRS1710.1109/HASE.2017.11https://doi.org/10.1109/HASE.2017.11https://dblp.org/rec/conf/hase/KumarRS17URL#2925021Rajesh Kumar 0012Mariëlle StoelingaQuantitative Security and Safety Analysis with Attack-Fault Trees.HASE25-322017Conference and Workshop Papersclosedconf/hase/KumarS1710.1109/HASE.2017.12https://doi.org/10.1109/HASE.2017.12https://dblp.org/rec/conf/hase/KumarS17URL#2925022Tze Meng LowFranz FranchettiHigh Assurance Code Generation for Cyber-Physical Systems.HASE104-1112017Conference and Workshop Papersclosedconf/hase/LowF1710.1109/HASE.2017.28https://doi.org/10.1109/HASE.2017.28https://dblp.org/rec/conf/hase/LowF17URL#2925023Dusica MarijanMarius LiaaenTest Prioritization with Optimally Balanced Configuration Coverage.HASE100-1032017Conference and Workshop Papersclosedconf/hase/MarijanL1710.1109/HASE.2017.26https://doi.org/10.1109/HASE.2017.26https://dblp.org/rec/conf/hase/MarijanL17URL#2925024Dusica MarijanSagar SenDetecting and Reducing Redundancy in Software Testing for Highly Configurable Systems.HASE96-992017Conference and Workshop Papersclosedconf/hase/MarijanS1710.1109/HASE.2017.31https://doi.org/10.1109/HASE.2017.31https://dblp.org/rec/conf/hase/MarijanS17URL#2925025Laurent L. NjillaCharles A. KamhouaKevin A. KwiatPatrick HurleyNiki PissinouCyber Security Resource Allocation: A Markov Decision Process Approach.HASE49-522017Conference and Workshop Papersclosedconf/hase/NjillaKKHP1710.1109/HASE.2017.30https://doi.org/10.1109/HASE.2017.30https://dblp.org/rec/conf/hase/NjillaKKHP17URL#2925026Koyena PalSridhar AdepuJonathan GohEffectiveness of Association Rules Mining for Invariants Generation in Cyber-Physical Systems.HASE124-1272017Conference and Workshop Papersclosedconf/hase/PalAG1710.1109/HASE.2017.21https://doi.org/10.1109/HASE.2017.21https://dblp.org/rec/conf/hase/PalAG17URL#2925027Jay PrakashChuadhry Mujeeb AhmedCan You See Me On Performance of Wireless Fingerprinting in a Cyber Physical System.HASE163-1702017Conference and Workshop Papersclosedconf/hase/PrakashA1710.1109/HASE.2017.40https://doi.org/10.1109/HASE.2017.40https://dblp.org/rec/conf/hase/PrakashA17URL#2925028Giedre SabaliauskaiteSridhar AdepuIntegrating Six-Step Model with Information Flow Diagrams for Comprehensive Analysis of Cyber-Physical System Safety and Security.HASE41-482017Conference and Workshop Papersclosedconf/hase/SabaliauskaiteA1710.1109/HASE.2017.25https://doi.org/10.1109/HASE.2017.25https://dblp.org/rec/conf/hase/SabaliauskaiteA17URL#2925029Praneeth SakhamuriOlivia DasAcquisition of Virtual Machines for Tiered Applications with Availability Constraints.HASE132-1352017Conference and Workshop Papersclosedconf/hase/SakhamuriD1710.1109/HASE.2017.16https://doi.org/10.1109/HASE.2017.16https://dblp.org/rec/conf/hase/SakhamuriD17URL#2925030Nuno SilvaMarco VieiraJoão Carlos CunhaRam ChillaregeEvaluating a Corpus of Root Causes and Measures to Guide RCA Processes in Critical Software.HASE17-242017Conference and Workshop Papersclosedconf/hase/SilvaVCC1710.1109/HASE.2017.19https://doi.org/10.1109/HASE.2017.19https://dblp.org/rec/conf/hase/SilvaVCC17URL#2925031Kazi Zakia SultanaAjay DeoByron J. WilliamsCorrelation Analysis among Java Nano-Patterns and Software Vulnerabilities.HASE69-762017Conference and Workshop Papersclosedconf/hase/SultanaDW1710.1109/HASE.2017.18https://doi.org/10.1109/HASE.2017.18https://dblp.org/rec/conf/hase/SultanaDW17URL#2925032Danielle C. TarrafCharles A. KamhouaKevin A. KwiatLaurent NjillaMajority is Not Always Supreme: Less Can Be More When Voting with Compromised Nodes.HASE9-122017Conference and Workshop Papersclosedconf/hase/TarrafKKN1710.1109/HASE.2017.34https://doi.org/10.1109/HASE.2017.34https://dblp.org/rec/conf/hase/TarrafKKN17URL#2925033Anusha ThudimillaBruce M. McMillinMultiple Security Domain Nondeducibility Air Traffic Surveillance Systems.HASE136-1392017Conference and Workshop Papersclosedconf/hase/ThudimillaM1710.1109/HASE.2017.29https://doi.org/10.1109/HASE.2017.29https://dblp.org/rec/conf/hase/ThudimillaM17URL#2925034Jian XiangJohn C. KnightKevin J. SullivanIs My Software Consistent with the Real World?HASE1-42017Conference and Workshop Papersclosedconf/hase/XiangKS1710.1109/HASE.2017.20https://doi.org/10.1109/HASE.2017.20https://dblp.org/rec/conf/hase/XiangKS17URL#2925035Qi XiongYuan XuBaofeng ZhangFeng WangOverview of the Evasion Resilience Testing Technology for Network Based Intrusion Protecting Devices.HASE146-1522017Conference and Workshop Papersclosedconf/hase/XiongXZW1710.1109/HASE.2017.37https://doi.org/10.1109/HASE.2017.37https://dblp.org/rec/conf/hase/XiongXZW17URL#292503618th IEEE International Symposium on High Assurance Systems Engineering, HASE 2017, Singapore, January 12-14, 2017HASEIEEE Computer Society2017Editorshipconf/hase/2017https://ieeexplore.ieee.org/xpl/conhome/7911400/proceedinghttps://dblp.org/rec/conf/hase/2017URL#3034912Jaime C. AcostaSalamah SalamahAn Analysis Platform for Execution-Based Model Generation.HASE246-2472016Conference and Workshop Papersclosedconf/hase/AcostaS1610.1109/HASE.2016.12https://doi.org/10.1109/HASE.2016.12https://dblp.org/rec/conf/hase/AcostaS16URL#3252423Sridhar AdepuAditya MathurAn Investigation into the Response of a Water Treatment System to Cyber Attacks.HASE141-1482016Conference and Workshop Papersclosedconf/hase/AdepuM1610.1109/HASE.2016.14https://doi.org/10.1109/HASE.2016.14https://dblp.org/rec/conf/hase/AdepuM16URL#3252424Mohammed Al-RefaiWalter CazzolaSudipto GhoshRobert B. FranceUsing Models to Validate Unanticipated, Fine-Grained Adaptations at Runtime.HASE23-302016Conference and Workshop Papersclosedconf/hase/Al-RefaiCGF1610.1109/HASE.2016.40https://doi.org/10.1109/HASE.2016.40https://dblp.org/rec/conf/hase/Al-RefaiCGF16URL#3252425Anneliese AndrewsMahmoud AbdelgawadAhmed GarioWorld Model for Testing Autonomous Systems Using Petri Nets.HASE65-692016Conference and Workshop Papersclosedconf/hase/AndrewsAG1610.1109/HASE.2016.11https://doi.org/10.1109/HASE.2016.11https://dblp.org/rec/conf/hase/AndrewsAG16URL#3252426Tarek AwwadNadia BennaniLionel BrunieDavid CoquilHarald KoschVeronika Rehn-SonigoTask Characterization for an Effective Worker Targeting in Crowdsourcing.HASE63-642016Conference and Workshop Papersclosedconf/hase/AwwadBBCKR1610.1109/HASE.2016.20https://doi.org/10.1109/HASE.2016.20https://dblp.org/rec/conf/hase/AwwadBBCKR16URL#3252427Guillaume BabinYamine Aït AmeurMarc PantelCorrect Instantiation of a System Reconfiguration Pattern: A Proof and Refinement-Based Approach.HASE31-382016Conference and Workshop Papersclosedconf/hase/BabinAP1610.1109/HASE.2016.47https://doi.org/10.1109/HASE.2016.47https://dblp.org/rec/conf/hase/BabinAP16URL#3252428Marcello M. BersaniMarisol García-VallsThe Cost of Formal Verification in Adaptive CPS. An Example of a Virtualized Server Node.HASE39-462016Conference and Workshop Papersclosedconf/hase/BersaniG1610.1109/HASE.2016.46https://doi.org/10.1109/HASE.2016.46https://dblp.org/rec/conf/hase/BersaniG16URL#3252429Raymond C. Borges-HinkKaterina Goseva-PopstojanovaCharacterization of Cyberattacks Aimed at Integrated Industrial Control and Enterprise Systems: A Case Study.HASE149-1562016Conference and Workshop Papersclosedconf/hase/Borges-HinkG1610.1109/HASE.2016.49https://doi.org/10.1109/HASE.2016.49https://dblp.org/rec/conf/hase/Borges-HinkG16URL#3252430Swastik BrahmaKevin A. KwiatPramod K. VarshneyCharles A. KamhouaCSRS: Cyber Survive and Recover Simulator.HASE110-1132016Conference and Workshop Papersclosedconf/hase/BrahmaKVK1610.1109/HASE.2016.33https://doi.org/10.1109/HASE.2016.33https://dblp.org/rec/conf/hase/BrahmaKVK16URL#3252431Qi Cheng 0002Kevin A. KwiatCharles A. KamhouaDesign Diversity for Mitigating Monoculture Induced Threats.HASE17-182016Conference and Workshop Papersclosedconf/hase/ChengKK1610.1109/HASE.2016.37https://doi.org/10.1109/HASE.2016.37https://dblp.org/rec/conf/hase/ChengKK16URL#3252432Silvano ChiaradonnaFelicita Di GiandomenicoJun Xiao 0009Quantification of the Effectiveness of Medium Voltage Control Policies in Smart Grids.HASE284-2912016Conference and Workshop Papersclosedconf/hase/ChiaradonnaGX1610.1109/HASE.2016.42https://doi.org/10.1109/HASE.2016.42https://dblp.org/rec/conf/hase/ChiaradonnaGX16URL#3252433Key-whan ChungCharles A. KamhouaKevin A. KwiatZbigniew T. KalbarczykRavishankar K. IyerGame Theory with Learning for Cyber Security Monitoring.HASE1-82016Conference and Workshop Papersclosedconf/hase/ChungKKKI1610.1109/HASE.2016.48https://doi.org/10.1109/HASE.2016.48https://dblp.org/rec/conf/hase/ChungKKKI16URL#3252434Sara CleemputMustafa A. MustafaBart PreneelHigh Assurance Smart Metering.HASE294-2972016Conference and Workshop Papersclosedconf/hase/CleemputMP1610.1109/HASE.2016.41https://doi.org/10.1109/HASE.2016.41https://dblp.org/rec/conf/hase/CleemputMP16URL#3252435Saikat DasMohammad ZulkernineCLOUBEX: A Cloud-Based Security Analysis Framework for Browser Extensions.HASE268-2752016Conference and Workshop Papersclosedconf/hase/DasZ1610.1109/HASE.2016.18https://doi.org/10.1109/HASE.2016.18https://dblp.org/rec/conf/hase/DasZ16URL#3252436Lian DuanSanjai RayadurgamMats Per Erik HeimdahlOleg SokolskyInsup Lee 0001Representation of Confidence in Assurance Cases Using the Beta Distribution.HASE86-932016Conference and Workshop Papersclosedconf/hase/DuanRHSL1610.1109/HASE.2016.52https://doi.org/10.1109/HASE.2016.52https://dblp.org/rec/conf/hase/DuanRHSL16URL#3252437Ralph EastwoodRobert AlexanderTim KellySafe Multi-objective Planning with a Posteriori Preferences.HASE78-852016Conference and Workshop Papersclosedconf/hase/EastwoodAK1610.1109/HASE.2016.22https://doi.org/10.1109/HASE.2016.22https://dblp.org/rec/conf/hase/EastwoodAK16URL#3252438Yuan FeiHuibiao ZhuXi Wu 0005Huixing FangComparative Modeling and Verification of Pthreads and Dthreads.HASE132-1402016Conference and Workshop Papersclosedconf/hase/FeiZWF1610.1109/HASE.2016.15https://doi.org/10.1109/HASE.2016.15https://dblp.org/rec/conf/hase/FeiZWF16URL#3252439Eduardo B. FernándezPreventing and unifying threats in cyberphysical systems.HASE292-2932016Conference and Workshop Papersclosedconf/hase/Fernandez1610.1109/HASE.2016.50https://doi.org/10.1109/HASE.2016.50https://dblp.org/rec/conf/hase/Fernandez16URL#3252440Kerianne H. GrossAaron W. FifarekJonathan A. HoffmanIncremental Formal Methods Based Design Approach Demonstrated on a Coupled Tanks Control System.HASE181-1882016Conference and Workshop Papersclosedconf/hase/GrossFH1610.1109/HASE.2016.16https://doi.org/10.1109/HASE.2016.16https://dblp.org/rec/conf/hase/GrossFH16URL#3252441Ashlie B. HockingM. Anthony AielloJohn C. KnightNikos AréchigaProving Critical Properties of Simulink Models.HASE189-1962016Conference and Workshop Papersclosedconf/hase/HockingAKA1610.1109/HASE.2016.38https://doi.org/10.1109/HASE.2016.38https://dblp.org/rec/conf/hase/HockingAKA16URL#3252442Paul HydenIra S. MoskowitzStephen Russell 0001Using Network Topology to Supplement High Assurance Systems.HASE213-2192016Conference and Workshop Papersclosedconf/hase/HydenMR1610.1109/HASE.2016.51https://doi.org/10.1109/HASE.2016.51https://dblp.org/rec/conf/hase/HydenMR16URL#3252443Alexei IliasovAlexander B. RomanovskyFormal Analysis of Railway Signalling Data.HASE70-772016Conference and Workshop Papersclosedconf/hase/IliasovR1610.1109/HASE.2016.44https://doi.org/10.1109/HASE.2016.44https://dblp.org/rec/conf/hase/IliasovR16URL#3252444Alexei IliasovAlexander B. RomanovskyElena TroubitsynaLinas LaibinisFormalisation-Driven Development of Safety-Critical Systems.HASE165-1722016Conference and Workshop Papersclosedconf/hase/IliasovRTL1610.1109/HASE.2016.35https://doi.org/10.1109/HASE.2016.35https://dblp.org/rec/conf/hase/IliasovRTL16URL#3252445Md. Shahrear IqbalMohammad ZulkernineFehmi JaafarYuan GuFCFraud: Fighting Click-Fraud from the User Side.HASE157-1642016Conference and Workshop Papersclosedconf/hase/IqbalZJG1610.1109/HASE.2016.17https://doi.org/10.1109/HASE.2016.17https://dblp.org/rec/conf/hase/IqbalZJG16URL#3252446Azadeh JahanbanifarFerhat KhendekMaria ToeroeRuntime Adjustment of Configuration Models for Consistency Preservation.HASE102-1092016Conference and Workshop Papersclosedconf/hase/JahanbanifarKT1610.1109/HASE.2016.28https://doi.org/10.1109/HASE.2016.28https://dblp.org/rec/conf/hase/JahanbanifarKT16URL#3252447Yufei JiangCan ZhangDinghao WuPeng Liu 0005Feature-Based Software Customization: Preliminary Analysis, Formalization, and Methods.HASE122-1312016Conference and Workshop Papersclosedconf/hase/JiangZW01610.1109/HASE.2016.27https://doi.org/10.1109/HASE.2016.27https://dblp.org/rec/conf/hase/JiangZW016URL#3252448Pankaj KamthanNazlie ShahmirModeling Negative User Stories is Risky Business.HASE236-2372016Conference and Workshop Papersclosedconf/hase/KamthanS1610.1109/HASE.2016.34https://doi.org/10.1109/HASE.2016.34https://dblp.org/rec/conf/hase/KamthanS16URL#3252449Sunint Kaur KhalsaYvan LabicheAn Extension of Category Partition Testing for Highly Constrained Systems.HASE47-542016Conference and Workshop Papersclosedconf/hase/KhalsaL1610.1109/HASE.2016.45https://doi.org/10.1109/HASE.2016.45https://dblp.org/rec/conf/hase/KhalsaL16URL#3252450Michaël LauerMatthieu AmyJean-Charles FabreMatthieu RoyWilliam ExcoffonMiruna StoicescuEngineering Adaptive Fault-Tolerance Mechanisms for Resilient Computing on ROS.HASE94-1012016Conference and Workshop Papersclosedconf/hase/LauerAFRES1610.1109/HASE.2016.30https://doi.org/10.1109/HASE.2016.30https://dblp.org/rec/conf/hase/LauerAFRES16URL#3252451Hong LiuTianyu Yang 0001Jing Wang 0005Model Checking for the Fault Tolerance of Collaborative AUVs.HASE244-2452016Conference and Workshop Papersclosedconf/hase/LiuYW1610.1109/HASE.2016.23https://doi.org/10.1109/HASE.2016.23https://dblp.org/rec/conf/hase/LiuYW16URL#3252452Amel MammarThi Mai NguyenRégine LaleauFormal Development of a Secure Access Control Filter.HASE173-1802016Conference and Workshop Papersclosedconf/hase/MammarNL1610.1109/HASE.2016.10https://doi.org/10.1109/HASE.2016.10https://dblp.org/rec/conf/hase/MammarNL16URL#3252453Marco MoriAndrea CeccarelliPaolo LolliniAndrea BondavalliBernhard FrömelA Holistic Viewpoint-Based SysML Profile to Design Systems-of-Systems.HASE276-2832016Conference and Workshop Papersclosedconf/hase/MoriCLBF1610.1109/HASE.2016.21https://doi.org/10.1109/HASE.2016.21https://dblp.org/rec/conf/hase/MoriCLBF16URL#3252454Mohamed NaijaJean-Michel BruelSamir Ben AhmedTowards a MARTE Extension to Address Adaptation Mechanisms.HASE240-2432016Conference and Workshop Papersclosedconf/hase/NaijaBA1610.1109/HASE.2016.36https://doi.org/10.1109/HASE.2016.36https://dblp.org/rec/conf/hase/NaijaBA16URL#3252455Van Chan NgoAxel LegayJean QuilbeufStatistical Model Checking for SystemC Models.HASE197-2042016Conference and Workshop Papersclosedconf/hase/NgoLQ1610.1109/HASE.2016.24https://doi.org/10.1109/HASE.2016.24https://dblp.org/rec/conf/hase/NgoLQ16URL#3252456Nikhil PalaskarZahid A. SyedSean BanerjeeCharlotte TangEmpirical Techniques to Detect and Mitigate the Effects of Irrevocably Evolving User Profiles in Touch-Based Authentication Systems.HASE9-162016Conference and Workshop Papersclosedconf/hase/PalaskarSBT1610.1109/HASE.2016.39https://doi.org/10.1109/HASE.2016.39https://dblp.org/rec/conf/hase/PalaskarSBT16URL#3252457Sean J. S. RegisfordBrian K. HulbertAaron W. FifarekCompositional Architecture Design for Fuel Tank Thermal Systems.HASE205-2122016Conference and Workshop Papersclosedconf/hase/RegisfordHF1610.1109/HASE.2016.25https://doi.org/10.1109/HASE.2016.25https://dblp.org/rec/conf/hase/RegisfordHF16URL#3252458Eric ReinsmidtDavid SchwabLi YangSecuring a Connected Mobile System for Healthcare.HASE19-222016Conference and Workshop Papersclosedconf/hase/ReinsmidtSY1610.1109/HASE.2016.53https://doi.org/10.1109/HASE.2016.53https://dblp.org/rec/conf/hase/ReinsmidtSY16URL#3252459Giedre SabaliauskaiteGeok See NgJustin RuthsAditya P. MathurEmpirical Assessment of Methods to Detect Cyber Attacks on a Robot.HASE248-2512016Conference and Workshop Papersclosedconf/hase/SabaliauskaiteN1610.1109/HASE.2016.19https://doi.org/10.1109/HASE.2016.19https://dblp.org/rec/conf/hase/SabaliauskaiteN16URL#3252460Puntitra SawadpongEdward B. AllenSoftware Defect Prediction Using Exception Handling Call Graphs: A Case Study.HASE55-622016Conference and Workshop Papersclosedconf/hase/SawadpongA1610.1109/HASE.2016.13https://doi.org/10.1109/HASE.2016.13https://dblp.org/rec/conf/hase/SawadpongA16URL#3252461Philipp StephanowChristian BanseJulian SchütteGenerating Threat Profiles for Cloud Service Certification Systems.HASE260-2672016Conference and Workshop Papersclosedconf/hase/StephanowBS1610.1109/HASE.2016.43https://doi.org/10.1109/HASE.2016.43https://dblp.org/rec/conf/hase/StephanowBS16URL#3252462S. Tucker TaftFlorian SchandaYannick MoyHigh-Integrity Multitasking in SPARK: Static Detection of Data Races and Locking Cycles.HASE238-2392016Conference and Workshop Papersclosedconf/hase/TaftSM1610.1109/HASE.2016.54https://doi.org/10.1109/HASE.2016.54https://dblp.org/rec/conf/hase/TaftSM16URL#3252463Xi Wu 0005Yongxin ZhaoHuibiao ZhuIntegrating a Calculus with Mobility and Quality for Wireless Sensor Networks.HASE220-2272016Conference and Workshop Papersclosedconf/hase/WuZZ1610.1109/HASE.2016.29https://doi.org/10.1109/HASE.2016.29https://dblp.org/rec/conf/hase/WuZZ16URL#3252464Jian XiangJohn C. KnightKevin J. SullivanSynthesis of Logic Interpretations.HASE114-1212016Conference and Workshop Papersclosedconf/hase/XiangKS1610.1109/HASE.2016.32https://doi.org/10.1109/HASE.2016.32https://dblp.org/rec/conf/hase/XiangKS16URL#3252465Renyu YangTianyu WoChunming HuJie Xu 0007Mingming ZhangD2PS: A Dependable Data Provisioning Service in Multi-tenant Cloud Environment.HASE252-2592016Conference and Workshop Papersclosedconf/hase/YangWHXZ1610.1109/HASE.2016.26https://doi.org/10.1109/HASE.2016.26https://dblp.org/rec/conf/hase/YangWHXZ16URL#3252466Tommaso ZoppiAndrea CeccarelliPaolo LolliniAndrea BondavalliFrancesco Lo PiccoloGabriele GiuntaVito MorrealePresenting the Proper Data to the Crisis Management Operator: A Relevance Labelling Strategy.HASE228-2352016Conference and Workshop Papersclosedconf/hase/ZoppiCLBPGM1610.1109/HASE.2016.31https://doi.org/10.1109/HASE.2016.31https://dblp.org/rec/conf/hase/ZoppiCLBPGM16URL#3252467Radu F. BabiceanuHélène WaeselynckRaymond A. PaulBojan CukicJie Xu17th IEEE International Symposium on High Assurance Systems Engineering, HASE 2016, Orlando, FL, USA, January 7-9, 2016HASEIEEE Computer Society2016Editorshipconf/hase/2016https://ieeexplore.ieee.org/xpl/conhome/7423043/proceedinghttps://dblp.org/rec/conf/hase/2016URL#3359407Fredrik AsplundMartin TörngrenRichard HawkinsJohn A. McDermidThe Need for a Confidence View of CPS Support Environments (Fast Abstract).HASE273-2742015Conference and Workshop Papersclosedconf/hase/AsplundTHM1510.1109/HASE.2015.14https://doi.org/10.1109/HASE.2015.14https://dblp.org/rec/conf/hase/AsplundTHM15URL#3562182Sean BanerjeeJordan HelmickZahid A. SyedBojan CukicEclipse vs. Mozilla: A Comparison of Two Large-Scale Open Source Problem Report Repositories.HASE263-2702015Conference and Workshop Papersclosedconf/hase/BanerjeeHSC1510.1109/HASE.2015.45https://doi.org/10.1109/HASE.2015.45https://dblp.org/rec/conf/hase/BanerjeeHSC15URL#3562183William C. BarottTed DabrowskiBraham HimedFidelity and Complexity in Passive Radar Simulations.HASE277-2782015Conference and Workshop Papersclosedconf/hase/BarottDH1510.1109/HASE.2015.30https://doi.org/10.1109/HASE.2015.30https://dblp.org/rec/conf/hase/BarottDH15URL#3562184Valentina BonfiglioLeonardo MontecchiFrancesco RossiPaolo LolliniAndrás PatariczaAndrea BondavalliExecutable Models to Support Automated Software FMEA.HASE189-1962015Conference and Workshop Papersclosedconf/hase/BonfiglioMRLPB1510.1109/HASE.2015.36https://doi.org/10.1109/HASE.2015.36https://dblp.org/rec/conf/hase/BonfiglioMRLPB15URL#3562185Zakaryae BoudiEl-Miloudi El-KoursiSimon Collart DutilleulHCPN Modeling for ERTMS Requirements Specification.HASE271-2722015Conference and Workshop Papersclosedconf/hase/BoudiED1510.1109/HASE.2015.11https://doi.org/10.1109/HASE.2015.11https://dblp.org/rec/conf/hase/BoudiED15URL#3562186Andrea CeccarelliMarco MoriPaolo LolliniAndrea BondavalliIntroducing Meta-Requirements for Describing System of Systems.HASE150-1572015Conference and Workshop Papersclosedconf/hase/CeccarelliMLB1510.1109/HASE.2015.31https://doi.org/10.1109/HASE.2015.31https://dblp.org/rec/conf/hase/CeccarelliMLB15URL#3562187Ewen DenneyGanesh J. PaiIain WhitesideFormal Foundations for Hierarchical Safety Cases.HASE52-592015Conference and Workshop Papersclosedconf/hase/DenneyPW1510.1109/HASE.2015.17https://doi.org/10.1109/HASE.2015.17https://dblp.org/rec/conf/hase/DenneyPW15URL#3562188Mahsa Emami-TabaMehdi AmouiLadan TahvildariStrategy-Aware Mitigation Using Markov Games for Dynamic Application-Layer Attacks.HASE134-1412015Conference and Workshop Papersclosedconf/hase/Emami-TabaAT1510.1109/HASE.2015.28https://doi.org/10.1109/HASE.2015.28https://dblp.org/rec/conf/hase/Emami-TabaAT15URL#3562189Huixing FangHuibiao ZhuJianqi ShiAn Object-Oriented Language for Modeling of Hybrid Systems.HASE1-92015Conference and Workshop Papersclosedconf/hase/FangZS1510.1109/HASE.2015.9https://doi.org/10.1109/HASE.2015.9https://dblp.org/rec/conf/hase/FangZS15URL#3562190Vahid Aghaei ForoushaniNur Zincir-HeywoodA Proxy Identifier Based on Patterns in Traffic Flows.HASE118-1252015Conference and Workshop Papersclosedconf/hase/ForoushaniZ1510.1109/HASE.2015.26https://doi.org/10.1109/HASE.2015.26https://dblp.org/rec/conf/hase/ForoushaniZ15URL#3562191Xianjin FuZhenbang ChenYufeng Zhang 0001Chun HuangWei Dong 0006Ji Wang 0001MPISE: Symbolic Execution of MPI Programs.HASE181-1882015Conference and Workshop Papersclosedconf/hase/FuCZHDW1510.1109/HASE.2015.35https://doi.org/10.1109/HASE.2015.35https://dblp.org/rec/conf/hase/FuCZHDW15URL#3562192Richard HawkinsIbrahim HabliDimitrios S. KolovosRichard F. PaigeTim KellyWeaving an Assurance Case from Design: A Model-Based Approach.HASE110-1172015Conference and Workshop Papersclosedconf/hase/HawkinsHKPK1510.1109/HASE.2015.25https://doi.org/10.1109/HASE.2015.25https://dblp.org/rec/conf/hase/HawkinsHKPK15URL#3562193Andreas IbingAlexandra MaiA Fixed-Point Algorithm for Automated Static Detection of Infinite Loops.HASE44-512015Conference and Workshop Papersclosedconf/hase/IbingM1510.1109/HASE.2015.16https://doi.org/10.1109/HASE.2015.16https://dblp.org/rec/conf/hase/IbingM15URL#3562194Ivano IrreraMarco VieiraJoão DurãesAdaptive Failure Prediction for Computer Systems: A Framework and a Case Study.HASE142-1492015Conference and Workshop Papersclosedconf/hase/IrreraVD1510.1109/HASE.2015.29https://doi.org/10.1109/HASE.2015.29https://dblp.org/rec/conf/hase/IrreraVD15URL#3562195Ziad IsmailJean LeneutreDavid BatemanLin Chen 0002A Game-Theoretical Model for Security Risk Management of Interdependent ICT and Electrical Infrastructures.HASE101-1092015Conference and Workshop Papersclosedconf/hase/IsmailLBC1510.1109/HASE.2015.24https://doi.org/10.1109/HASE.2015.24https://dblp.org/rec/conf/hase/IsmailLBC15URL#3562196Erik van der KouweCristiano GiuffridaRazvan GhituletezAndrew S. TanenbaumA Methodology to Efficiently Compare Operating System Stability.HASE93-1002015Conference and Workshop Papersclosedconf/hase/KouweGGT1510.1109/HASE.2015.22https://doi.org/10.1109/HASE.2015.22https://dblp.org/rec/conf/hase/KouweGGT15URL#3562197Chen-Yu LeeKrishna M. KaviRaymond A. PaulMahadevan GomathisankaranOntology of Secure Service Level Agreement.HASE166-1722015Conference and Workshop Papersclosedconf/hase/LeeKPG1510.1109/HASE.2015.33https://doi.org/10.1109/HASE.2015.33https://dblp.org/rec/conf/hase/LeeKPG15URL#3562198Bo LiMengdi WangYongxin ZhaoGeguang PuHuibiao ZhuFu SongModeling and Verifying Google File System.HASE207-2142015Conference and Workshop Papersclosedconf/hase/LiWZPZS1510.1109/HASE.2015.38https://doi.org/10.1109/HASE.2015.38https://dblp.org/rec/conf/hase/LiWZPZS15URL#3562199Xiaohua LiThomas Yang 0001Signal Processing Oriented Approach for Big Data Privacy.HASE275-2762015Conference and Workshop Papersclosedconf/hase/LiY1510.1109/HASE.2015.23https://doi.org/10.1109/HASE.2015.23https://dblp.org/rec/conf/hase/LiY15URL#3562200Chung-Ling LinWuwei ShenApplying Safety Case Pattern to Generate Assurance Cases for Safety-Critical Systems.HASE255-2622015Conference and Workshop Papersclosedconf/hase/LinS1510.1109/HASE.2015.44https://doi.org/10.1109/HASE.2015.44https://dblp.org/rec/conf/hase/LinS15URL#3562201Mathilde MachinFanny DufosséJérémie GuiochetDavid PowellMatthieu RoyHélène WaeselynckModel-Checking and Game theory for Synthesis of Safety Rules.HASE36-432015Conference and Workshop Papersclosedconf/hase/MachinDGPRW1510.1109/HASE.2015.15https://doi.org/10.1109/HASE.2015.15https://dblp.org/rec/conf/hase/MachinDGPRW15URL#3562202Atif MashkoorJean-Pierre JacquotObservation-Level-Driven Formal Modeling.HASE158-1652015Conference and Workshop Papersclosedconf/hase/MashkoorJ1510.1109/HASE.2015.32https://doi.org/10.1109/HASE.2015.32https://dblp.org/rec/conf/hase/MashkoorJ15URL#3562203David McKee 0001David WebsterJie Xu 0007Enabling Decision Support for the Delivery of Real-Time Services.HASE60-672015Conference and Workshop Papersclosedconf/hase/McKeeWX1510.1109/HASE.2015.18https://doi.org/10.1109/HASE.2015.18https://dblp.org/rec/conf/hase/McKeeWX15URL#3562204Karl A. MorrisPeter J. ClarkeXudong HeFábio M. CostaMengjun AllisonA Method for Validating Intent Model Behavior in DSVMs.HASE247-2542015Conference and Workshop Papersclosedconf/hase/MorrisCHCA1510.1109/HASE.2015.43https://doi.org/10.1109/HASE.2015.43https://dblp.org/rec/conf/hase/MorrisCHCA15URL#3562205A. Omar Portillo-DominguezMiao Wang 0002John Murphy 0001Damien MagoniAdaptive GC-Aware Load Balancing Strategy for High-Assurance Java Distributed Systems.HASE68-752015Conference and Workshop Papersclosedconf/hase/Portillo-Dominguez1510.1109/HASE.2015.19https://doi.org/10.1109/HASE.2015.19https://dblp.org/rec/conf/hase/Portillo-Dominguez15URL#3562206Genaína Nunes RodriguesVander AlvesVinicius NunesAndré LannaMaxime CordyPierre-Yves SchobbensAmir Molzam ShariflooAxel LegayModeling and Verification for Probabilistic Properties in Software Product Lines.HASE173-1802015Conference and Workshop Papersclosedconf/hase/RodriguesANLCSS1510.1109/HASE.2015.34https://doi.org/10.1109/HASE.2015.34https://dblp.org/rec/conf/hase/RodriguesANLCSS15URL#3562207Salamah SalamahOmar OchoaYadira JacquezUsing Pairwise Testing to Verify Automatically-Generated Formal Specifications.HASE279-2802015Conference and Workshop Papersclosedconf/hase/SalamahOJ1510.1109/HASE.2015.46https://doi.org/10.1109/HASE.2015.46https://dblp.org/rec/conf/hase/SalamahOJ15URL#3562208Jingmin ShiChao Peng 0004Qin ZhuPengfei DuanYu BaoMengjun XieThere is a Will, There is a Way: A New Mechanism for Traffic Control Based on VTL and VANET.HASE240-2462015Conference and Workshop Papersclosedconf/hase/ShiPZDBX1510.1109/HASE.2015.42https://doi.org/10.1109/HASE.2015.42https://dblp.org/rec/conf/hase/ShiPZDBX15URL#3562209Irfan SljivoOmar JaradatIain BatePatrick J. GraydonDeriving Safety Contracts to Support Architecture Design of Safety Critical Systems.HASE126-1332015Conference and Workshop Papersclosedconf/hase/SljivoJBG1510.1109/HASE.2015.27https://doi.org/10.1109/HASE.2015.27https://dblp.org/rec/conf/hase/SljivoJBG15URL#3562210Zahid A. SyedJordan HelmickSean BanerjeeBojan CukicEffect of User Posture and Device Size on the Performance of Touch-Based Authentication Systems.HASE10-172015Conference and Workshop Papersclosedconf/hase/SyedHBC1510.1109/HASE.2015.10https://doi.org/10.1109/HASE.2015.10https://dblp.org/rec/conf/hase/SyedHBC15URL#3562211Yiting TangXi Wu 0005Huibiao ZhuJian Guo 0005Formalization and Verification of REST Architecture in Viewpoints.HASE197-2062015Conference and Workshop Papersclosedconf/hase/TangWZG1510.1109/HASE.2015.37https://doi.org/10.1109/HASE.2015.37https://dblp.org/rec/conf/hase/TangWZG15URL#3562212Luyao WangFengwei SuiYanhong HuangHuibiao ZhuModeling and Verifying the Ballooning in Xen with CSP.HASE18-252015Conference and Workshop Papersclosedconf/hase/WangSHZ1510.1109/HASE.2015.12https://doi.org/10.1109/HASE.2015.12https://dblp.org/rec/conf/hase/WangSHZ15URL#3562213Jonas WestmanMattias NybergExtending Contract theory with Safety Integrity Levels.HASE85-922015Conference and Workshop Papersclosedconf/hase/WestmanN1510.1109/HASE.2015.21https://doi.org/10.1109/HASE.2015.21https://dblp.org/rec/conf/hase/WestmanN15URL#3562214Victor L. WinterShiraz HussainVerilog Synthesis in the Higher-Order Transformation Framework of TL.HASE26-352015Conference and Workshop Papersclosedconf/hase/WinterH1510.1109/HASE.2015.13https://doi.org/10.1109/HASE.2015.13https://dblp.org/rec/conf/hase/WinterH15URL#3562215Xi Wu 0005Huibiao ZhuA Calculus for Wireless Sensor Networks from Quality Perspective.HASE223-2312015Conference and Workshop Papersclosedconf/hase/WuZ1510.1109/HASE.2015.40https://doi.org/10.1109/HASE.2015.40https://dblp.org/rec/conf/hase/WuZ15URL#3562216Mengjun XieYanyan LiKenji YoshigoeRemzi SekerJiang Bian 0001CamAuth: Securing Web Authentication with Camera.HASE232-2392015Conference and Workshop Papersclosedconf/hase/XieLYSB1510.1109/HASE.2015.41https://doi.org/10.1109/HASE.2015.41https://dblp.org/rec/conf/hase/XieLYSB15URL#3562217Haixing YanHuixing FangChristian KukaHuibiao ZhuVerification for OAuth Using ASLan++.HASE76-842015Conference and Workshop Papersclosedconf/hase/YanFKZ1510.1109/HASE.2015.20https://doi.org/10.1109/HASE.2015.20https://dblp.org/rec/conf/hase/YanFKZ15URL#3562218Amira ZammaliAgnan de BonnevalYves CrouzetA Diversity-Based Approach for Communication Integrity in Critical Embedded Systems.HASE215-2222015Conference and Workshop Papersclosedconf/hase/ZammaliBC1510.1109/HASE.2015.39https://doi.org/10.1109/HASE.2015.39https://dblp.org/rec/conf/hase/ZammaliBC15URL#356221916th IEEE International Symposium on High Assurance Systems Engineering, HASE 2015, Daytona Beach, FL, USA, January 8-10, 2015HASEIEEE Computer Society2015Editorshipconf/hase/2015https://ieeexplore.ieee.org/xpl/conhome/7027113/proceedinghttps://dblp.org/rec/conf/hase/2015URL#3667810Abdulrahman AlmutairiTawfeeq A. ShawlySaleh M. BasalamahArif GhafoorPolicy-Driven High Assurance Cyber Infrastructure-Based Systems.HASE146-1532014Conference and Workshop Papersclosedconf/hase/AlmutairiSBG1410.1109/HASE.2014.28https://doi.org/10.1109/HASE.2014.28https://dblp.org/rec/conf/hase/AlmutairiSBG14URL#3859383Anneliese Amschler AndrewsHyunsook DoTrade-Off Analysis for Selective versus Brute-Force Regression Testing in FSMWeb.HASE184-1922014Conference and Workshop Papersclosedconf/hase/AndrewsD1410.1109/HASE.2014.33https://doi.org/10.1109/HASE.2014.33https://dblp.org/rec/conf/hase/AndrewsD14URL#3859384Anneliese Amschler AndrewsSalwa ElakeiliSalah BoukhrisFail-Safe Test Generation in Safety Critical Systems.HASE49-562014Conference and Workshop Papersclosedconf/hase/AndrewsEB1410.1109/HASE.2014.16https://doi.org/10.1109/HASE.2014.16https://dblp.org/rec/conf/hase/AndrewsEB14URL#3859385Claudio A. ArdagnaErnesto DamianiKouessi A. R. SagboFulvio FratiZero-Knowledge Evaluation of Service Performance Based on Simulation.HASE254-2582014Conference and Workshop Papersclosedconf/hase/ArdagnaDSF1410.1109/HASE.2014.47https://doi.org/10.1109/HASE.2014.47https://dblp.org/rec/conf/hase/ArdagnaDSF14URL#3859386Jiri BarnatPetr BauchVojtech HavelTemporal Verification of Simulink Diagrams.HASE81-882014Conference and Workshop Papersclosedconf/hase/BarnatBH1410.1109/HASE.2014.20https://doi.org/10.1109/HASE.2014.20https://dblp.org/rec/conf/hase/BarnatBH14URL#3859387Zheng ChenAllen McBrideUsing Flash to Tolerate Track Failures in RAID.HASE234-2352014Conference and Workshop Papersclosedconf/hase/ChenM1410.1109/HASE.2014.41https://doi.org/10.1109/HASE.2014.41https://dblp.org/rec/conf/hase/ChenM14URL#3859388Philippa ConmyIain BateAssuring Safety for Component Based Software Engineering.HASE121-1282014Conference and Workshop Papersclosedconf/hase/ConmyB1410.1109/HASE.2014.25https://doi.org/10.1109/HASE.2014.25https://dblp.org/rec/conf/hase/ConmyB14URL#3859389Ali DavoudianFerhat KhendekMaria ToeroeOrdering Upgrade Changes for Highly Available Component Based Systems.HASE259-2602014Conference and Workshop Papersclosedconf/hase/DavoudianKT1410.1109/HASE.2014.48https://doi.org/10.1109/HASE.2014.48https://dblp.org/rec/conf/hase/DavoudianKT14URL#3859390Yujian FuSteven Drager 0001Modeling and Verification of Humanoid Robot Task Coordination.HASE73-802014Conference and Workshop Papersclosedconf/hase/FuD1410.1109/HASE.2014.19https://doi.org/10.1109/HASE.2014.19https://dblp.org/rec/conf/hase/FuD14URL#3859391Jerry Gao 0002Wei-Tek TsaiRaymond A. PaulXiaoying BaiTadahiro UeharaMobile Testing-as-a-Service (MTaaS) - Infrastructures, Issues, Solutions and Needs.HASE158-1672014Conference and Workshop Papersclosedconf/hase/GaoTPBU1410.1109/HASE.2014.30https://doi.org/10.1109/HASE.2014.30https://dblp.org/rec/conf/hase/GaoTPBU14URL#3859392Peter GarraghanPaul TownendJie Xu 0007An Empirical Failure-Analysis of a Large-Scale Cloud Computing Environment.HASE113-1202014Conference and Workshop Papersclosedconf/hase/GarraghanTX1410.1109/HASE.2014.24https://doi.org/10.1109/HASE.2014.24https://dblp.org/rec/conf/hase/GarraghanTX14URL#3859393Patrick J. GraydonIain BateOn the Nature and Content of Safety Contracts.HASE245-2462014Conference and Workshop Papersclosedconf/hase/GraydonB1410.1109/HASE.2014.44https://doi.org/10.1109/HASE.2014.44https://dblp.org/rec/conf/hase/GraydonB14URL#3859394Martin Hoffmann 0001Peter UlbrichChristian Dietrich 0001Horst SchirmeierDaniel LohmannWolfgang Schröder-PreikschatA Practitioner's Guide to Software-Based Soft-Error Mitigation Using AN-Codes.HASE33-402014Conference and Workshop Papersclosedconf/hase/HoffmannUDSLS1410.1109/HASE.2014.14https://doi.org/10.1109/HASE.2014.14https://dblp.org/rec/conf/hase/HoffmannUDSLS14URL#3859395Ivano IrreraJoão DurãesMarco VieiraOn the Need for Training Failure Prediction Algorithms in Evolving Software Systems.HASE216-2232014Conference and Workshop Papersclosedconf/hase/IrreraDV1410.1109/HASE.2014.38https://doi.org/10.1109/HASE.2014.38https://dblp.org/rec/conf/hase/IrreraDV14URL#3859396Tadashi KogaXiaodong LuKinji MoriAutonomous Decentralized High-Assurance Surveillance System for Air Traffic Control.HASE154-1572014Conference and Workshop Papersclosedconf/hase/KogaLM1410.1109/HASE.2014.29https://doi.org/10.1109/HASE.2014.29https://dblp.org/rec/conf/hase/KogaLM14URL#3859397Erik van der KouweCristiano GiuffridaAndrew S. TanenbaumEvaluating Distortion in Fault Injection Experiments.HASE25-322014Conference and Workshop Papersclosedconf/hase/KouweGT1410.1109/HASE.2014.13https://doi.org/10.1109/HASE.2014.13https://dblp.org/rec/conf/hase/KouweGT14URL#3859398Pei LuoAndy Yu-Lun LinZhen Wang 0001Mark G. KarpovskyHardware Implementation of Secure Shamir's Secret Sharing Scheme.HASE193-2002014Conference and Workshop Papersclosedconf/hase/LuoLWK1410.1109/HASE.2014.34https://doi.org/10.1109/HASE.2014.34https://dblp.org/rec/conf/hase/LuoLWK14URL#3859399Mahnaz MalekzadehIain BateMaking an ALARP Decision of Sufficient Testing.HASE57-642014Conference and Workshop Papersclosedconf/hase/MalekzadehB1410.1109/HASE.2014.17https://doi.org/10.1109/HASE.2014.17https://dblp.org/rec/conf/hase/MalekzadehB14URL#3859400Amel MammarMarc FrappierVerifying the Precedence Property Pattern Using the B Method.HASE229-2332014Conference and Workshop Papersclosedconf/hase/MammarF1410.1109/HASE.2014.40https://doi.org/10.1109/HASE.2014.40https://dblp.org/rec/conf/hase/MammarF14URL#3859401Koosha MarashiSahra Sedigh SarvestaniTowards Comprehensive Modeling of Reliability for Smart Grids: Requirements and Challenges.HASE105-1122014Conference and Workshop Papersclosedconf/hase/MarashiS1410.1109/HASE.2014.23https://doi.org/10.1109/HASE.2014.23https://dblp.org/rec/conf/hase/MarashiS14URL#3859402Yuki MatsuiHideharu KojimaTatsuhiro TsuchiyaModeling the Interaction of Power Line and SCADA Networks.HASE261-2622014Conference and Workshop Papersclosedconf/hase/MatsuiKT1410.1109/HASE.2014.49https://doi.org/10.1109/HASE.2014.49https://dblp.org/rec/conf/hase/MatsuiKT14URL#3859403Regina MoraesHélène WaeselynckJérémie GuiochetUML-Based Modeling of Robustness Testing.HASE168-1752014Conference and Workshop Papersclosedconf/hase/MoraesWG1410.1109/HASE.2014.31https://doi.org/10.1109/HASE.2014.31https://dblp.org/rec/conf/hase/MoraesWG14URL#3859404Jesse MusgroveBojan CukicVittorio CortellessaProactive Model-Based Performance Analysis and Security Tradeoffs in a Complex System.HASE211-2152014Conference and Workshop Papersclosedconf/hase/MusgroveCC1410.1109/HASE.2014.37https://doi.org/10.1109/HASE.2014.37https://dblp.org/rec/conf/hase/MusgroveCC14URL#3859405Amanda Sávio NascimentoCecília M. F. RubiraFernando CastorArCMAPE: A Software Product Line Infrastructure to Support Fault-Tolerant Composite Services.HASE41-482014Conference and Workshop Papersclosedconf/hase/NascimentoRC1410.1109/HASE.2014.15https://doi.org/10.1109/HASE.2014.15https://dblp.org/rec/conf/hase/NascimentoRC14URL#3859406Hiroyuki OkamuraTadashi DohiA Novel Framework of Software Reliability Evaluation with Software Reliability Growth Models and Software Metrics.HASE97-1042014Conference and Workshop Papersclosedconf/hase/OkamuraD1410.1109/HASE.2014.22https://doi.org/10.1109/HASE.2014.22https://dblp.org/rec/conf/hase/OkamuraD14URL#3859407Takao OkuboNobukazu YoshiokaHaruhiko KaiyaSecurity Driven Requirements Refinement and Exploration of Architecture with Multiple NFR Points of View.HASE201-2052014Conference and Workshop Papersclosedconf/hase/OkuboYK1410.1109/HASE.2014.35https://doi.org/10.1109/HASE.2014.35https://dblp.org/rec/conf/hase/OkuboYK14URL#3859408Alexandre PetrenkoKeqin Li 0002Roland GrozKarim HossenCatherine OriatInferring Approximated Models for Systems Engineering.HASE249-2532014Conference and Workshop Papersclosedconf/hase/Petrenko0GHO1410.1109/HASE.2014.46https://doi.org/10.1109/HASE.2014.46https://dblp.org/rec/conf/hase/Petrenko0GHO14URL#3859409Alexandre PetrenkoNina Yevtushenko 0001Adaptive Testing of Nondeterministic Systems with FSM.HASE224-2282014Conference and Workshop Papersclosedconf/hase/PetrenkoY1410.1109/HASE.2014.39https://doi.org/10.1109/HASE.2014.39https://dblp.org/rec/conf/hase/PetrenkoY14URL#3859410Farzana RahmanDrew WilliamsSheikh Iqbal AhamedJi-Jiang YangQing Wang 0003PriDaC: Privacy Preserving Data Collection in Sensor Enabled RFID Based Healthcare Services.HASE236-2422014Conference and Workshop Papersclosedconf/hase/RahmanWAYW1410.1109/HASE.2014.42https://doi.org/10.1109/HASE.2014.42https://dblp.org/rec/conf/hase/RahmanWAYW14URL#3859411Curtis RasmussenRozita Dara 0001Recommender Systems for Privacy Management: A Framework.HASE243-2442014Conference and Workshop Papersclosedconf/hase/RasmussenD1410.1109/HASE.2014.43https://doi.org/10.1109/HASE.2014.43https://dblp.org/rec/conf/hase/RasmussenD14URL#3859412Hossain ShahriarSarah NorthEdward MawangiTesting of Memory Leak in Android Applications.HASE176-1832014Conference and Workshop Papersclosedconf/hase/ShahriarNM1410.1109/HASE.2014.32https://doi.org/10.1109/HASE.2014.32https://dblp.org/rec/conf/hase/ShahriarNM14URL#3859413Jawwad A. ShamsiSufian HameedWaleed RahmanFarooq ZuberiKaiser AltafAmmar AmjadClicksafe: Providing Security against Clickjacking Attacks.HASE206-2102014Conference and Workshop Papersclosedconf/hase/ShamsiHRZAA1410.1109/HASE.2014.36https://doi.org/10.1109/HASE.2014.36https://dblp.org/rec/conf/hase/ShamsiHRZAA14URL#3859414Panayiotis SteeleJohn KnightAnalysis of Critical Systems Certification.HASE129-1362014Conference and Workshop Papersclosedconf/hase/SteeleK1410.1109/HASE.2014.26https://doi.org/10.1109/HASE.2014.26https://dblp.org/rec/conf/hase/SteeleK14URL#3859415Zahid A. SyedSean BanerjeeBojan CukicLeveraging Variations in Event Sequences in Keystroke-Dynamics Authentication Systems.HASE9-162014Conference and Workshop Papersclosedconf/hase/SyedBC1410.1109/HASE.2014.11https://doi.org/10.1109/HASE.2014.11https://dblp.org/rec/conf/hase/SyedBC14URL#3859416Farid Molazem TabriziKarthik PattabiramanA Model-Based Intrusion Detection System for Smart Meters.HASE17-242014Conference and Workshop Papersclosedconf/hase/TabriziP1410.1109/HASE.2014.12https://doi.org/10.1109/HASE.2014.12https://dblp.org/rec/conf/hase/TabriziP14URL#3859417Krishna K. VenkatasubramanianEugene Y. VassermanOleg SokolskyInsup Lee 0001Functional Alarms for Systems of Interoperable Medical Devices.HASE247-2482014Conference and Workshop Papersclosedconf/hase/VenkatasubramanianVSL1410.1109/HASE.2014.45https://doi.org/10.1109/HASE.2014.45https://dblp.org/rec/conf/hase/VenkatasubramanianVSL14URL#3859418Victor L. WinterCarl ReinkeJonathan GuerreroUsing Program Transformation, Annotation, and Reflection to Certify a Java Type Resolution Function.HASE137-1452014Conference and Workshop Papersclosedconf/hase/WinterRG1410.1109/HASE.2014.27https://doi.org/10.1109/HASE.2014.27https://dblp.org/rec/conf/hase/WinterRG14URL#3859419Faqing YangJean-Pierre JacquotJeanine SouquièresProving the Fidelity of Simulations of Event-B Models.HASE89-962014Conference and Workshop Papersclosedconf/hase/YangJS1410.1109/HASE.2014.21https://doi.org/10.1109/HASE.2014.21https://dblp.org/rec/conf/hase/YangJS14URL#3859420Awad A. YounisYashwant K. MalaiyaIndrajit RayUsing Attack Surface Entry Points and Reachability Analysis to Assess the Risk of Software Vulnerability Exploitability.HASE1-82014Conference and Workshop Papersclosedconf/hase/YounisMR1410.1109/HASE.2014.10https://doi.org/10.1109/HASE.2014.10https://dblp.org/rec/conf/hase/YounisMR14URL#3859421Linbin YuFeng DuanYu Lei 0001Raghu KackerD. Richard KuhnCombinatorial Test Generation for Software Product Lines Using Minimum Invalid Tuples.HASE65-722014Conference and Workshop Papersclosedconf/hase/YuDLKK1410.1109/HASE.2014.18https://doi.org/10.1109/HASE.2014.18https://dblp.org/rec/conf/hase/YuDLKK14URL#385942215th International IEEE Symposium on High-Assurance Systems Engineering, HASE 2014, Miami Beach, FL, USA, January 9-11, 2014HASEIEEE Computer Society2014Editorshipconf/hase/2014https://ieeexplore.ieee.org/xpl/conhome/6754245/proceedinghttps://dblp.org/rec/conf/hase/2014URL#3962096Muhammad AfzaalCesario Di SarnoLuigi CoppolinoSalvatore D'AntonioLuigi RomanoA Resilient Architecture for Forensic Storage of Events in Critical Infrastructures.HASE48-552012Conference and Workshop Papersclosedconf/hase/AfzaalSCDR1210.1109/HASE.2012.9https://doi.org/10.1109/HASE.2012.9https://dblp.org/rec/conf/hase/AfzaalSCDR12URL#4417157Mark AllisonKarl A. MorrisZhenyu YangPeter J. ClarkeFábio M. CostaTowards Reliable Smart Microgrid Behavior Using Runtime Model Synthesis.HASE185-1922012Conference and Workshop Papersclosedconf/hase/AllisonMYCC1210.1109/HASE.2012.37https://doi.org/10.1109/HASE.2012.37https://dblp.org/rec/conf/hase/AllisonMYCC12URL#4417158César AndrésAna R. CavalliHow to Reduce the Cost of Passive Testing.HASE209-2162012Conference and Workshop Papersclosedconf/hase/AndresC1210.1109/HASE.2012.36https://doi.org/10.1109/HASE.2012.36https://dblp.org/rec/conf/hase/AndresC12URL#4417159Sean BanerjeeBojan CukicDonald A. AdjerohAutomated Duplicate Bug Report Classification Using Subsequence Matching.HASE74-812012Conference and Workshop Papersclosedconf/hase/BanerjeeCA1210.1109/HASE.2012.38https://doi.org/10.1109/HASE.2012.38https://dblp.org/rec/conf/hase/BanerjeeCA12URL#4417160Boutheina BannourChristophe GastonArnault LapitreJose Pablo EscobedoIncremental Symbolic Conformance Testing from UML MARTE Sequence Diagrams: Railway Use Case.HASE9-162012Conference and Workshop Papersclosedconf/hase/BannourGLE1210.1109/HASE.2012.18https://doi.org/10.1109/HASE.2012.18https://dblp.org/rec/conf/hase/BannourGLE12URL#4417161Andrea CeccarelliAndrea BondavalliJoão FigueirasBoris MalinowskyJurij WakulaFrancesco BrancatiCarlo DambraAndrea SeminatoreDesign and Implementation of Real-Time Wearable Devices for a Safety-Critical Track Warning System.HASE147-1542012Conference and Workshop Papersclosedconf/hase/CeccarelliBFMWBDS1210.1109/HASE.2012.17https://doi.org/10.1109/HASE.2012.17https://dblp.org/rec/conf/hase/CeccarelliBFMWBDS12URL#4417162Piergiuseppe Bettassa CopetAlfredo Pironti 0001Davide PozzaRiccardo SistoPietro VivoliVisual Model-Driven Design, Verification and Implementation of Security Protocols.HASE62-652012Conference and Workshop Papersclosedconf/hase/CopetPPSV1210.1109/HASE.2012.23https://doi.org/10.1109/HASE.2012.23https://dblp.org/rec/conf/hase/CopetPPSV12URL#4417163Utsav DroliaSoila KavulyaKunal MankodiyaPriya NarasimhanThomas E. FuhrmanDiagnostic Fusion for Time-Triggered Automotive Networks.HASE1-82012Conference and Workshop Papersclosedconf/hase/DroliaKMNF1210.1109/HASE.2012.11https://doi.org/10.1109/HASE.2012.11https://dblp.org/rec/conf/hase/DroliaKMNF12URL#4417164João FigueirasJesper GrønbækAndrea CeccarelliHans-Peter SchwefelGPS and Electronic Fence Data Fusion for Positioning within Railway Worksite Scenarios.HASE17-232012Conference and Workshop Papersclosedconf/hase/FigueirasGCS1210.1109/HASE.2012.30https://doi.org/10.1109/HASE.2012.30https://dblp.org/rec/conf/hase/FigueirasGCS12URL#4417165Luke HerbertRobin SharpUsing Stochastic Model Checking to Provision Complex Business Services.HASE98-1052012Conference and Workshop Papersclosedconf/hase/HerbertS1210.1109/HASE.2012.29https://doi.org/10.1109/HASE.2012.29https://dblp.org/rec/conf/hase/HerbertS12URL#4417166Kavyashree JambotiPeter LiggesmeyerA Framework for Generating Integrated Component Fault Trees from Architectural Views.HASE114-1212012Conference and Workshop Papersclosedconf/hase/JambotiL1210.1109/HASE.2012.27https://doi.org/10.1109/HASE.2012.27https://dblp.org/rec/conf/hase/JambotiL12URL#4417167Andreas JohnsenKristina LundqvistPaul PetterssonOmar JaradatAutomated Verification of AADL-Specifications Using UPPAAL.HASE130-1382012Conference and Workshop Papersclosedconf/hase/JohnsenLPJ1210.1109/HASE.2012.22https://doi.org/10.1109/HASE.2012.22https://dblp.org/rec/conf/hase/JohnsenLPJ12URL#4417168Michael LipaczewskiSimon StruckFrank OrtmeierUsing Tool-Supported Model Based Safety Analysis - Progress and Experiences in SAML Development.HASE159-1662012Conference and Workshop Papersclosedconf/hase/LipaczewskiSO1210.1109/HASE.2012.34https://doi.org/10.1109/HASE.2012.34https://dblp.org/rec/conf/hase/LipaczewskiSO12URL#4417169Hong LuLi ZhangZhao LiuA MDA-based Approach for Developing Simulation-Oriented Combat Flows.HASE155-1582012Conference and Workshop Papersclosedconf/hase/LuZL1210.1109/HASE.2012.32https://doi.org/10.1109/HASE.2012.32https://dblp.org/rec/conf/hase/LuZL12URL#4417170Amel MammarMarc FrappierRaphaël Chane-Yack-FaProving the Absence Property Pattern Using the B Method.HASE167-1702012Conference and Workshop Papersclosedconf/hase/MammarFC1210.1109/HASE.2012.26https://doi.org/10.1109/HASE.2012.26https://dblp.org/rec/conf/hase/MammarFC12URL#4417171Karl A. MorrisJinpeng WeiPeter J. ClarkeFábio M. CostaTowards Adaptable Middleware to Support Service Delivery Validation in i-DSML Execution Engines.HASE82-892012Conference and Workshop Papersclosedconf/hase/MorrisWCC1210.1109/HASE.2012.25https://doi.org/10.1109/HASE.2012.25https://dblp.org/rec/conf/hase/MorrisWCC12URL#4417172Boris MotrukJonas DiemerRainer BuchtyRolf ErnstMladen BerekovicIDAMC: A Many-Core Platform with Run-Time Monitoring for Mixed-Criticality.HASE24-312012Conference and Workshop Papersclosedconf/hase/MotrukDBEB1210.1109/HASE.2012.19https://doi.org/10.1109/HASE.2012.19https://dblp.org/rec/conf/hase/MotrukDBEB12URL#4417173Huu Nghia NguyenPascal PoizatFatiha ZaïdiOnline Verification of Value-Passing Choreographies through Property-Oriented Passive Testing.HASE106-1132012Conference and Workshop Papersclosedconf/hase/NguyenPZ1210.1109/HASE.2012.15https://doi.org/10.1109/HASE.2012.15https://dblp.org/rec/conf/hase/NguyenPZ12URL#4417174Abhishek ParakhCommunication Efficient Oblivious Transfer Using Elliptic Curves.HASE173-1742012Conference and Workshop Papersclosedconf/hase/Parakh1210.1109/HASE.2012.14https://doi.org/10.1109/HASE.2012.14https://dblp.org/rec/conf/hase/Parakh12URL#4417175Thomas RuhrothJan JürjensSupporting Security Assurance in the Context of Evolution: Modular Modeling and Analysis with UMLsec.HASE177-1842012Conference and Workshop Papersclosedconf/hase/RuhrothJ1210.1109/HASE.2012.35https://doi.org/10.1109/HASE.2012.35https://dblp.org/rec/conf/hase/RuhrothJ12URL#4417176Anthony SargeantPaul TownendJie Xu 0007Karim DjemameEvaluating the Dependability of Dynamic Binding in Web Services.HASE139-1462012Conference and Workshop Papersclosedconf/hase/SargeantTXD1210.1109/HASE.2012.28https://doi.org/10.1109/HASE.2012.28https://dblp.org/rec/conf/hase/SargeantTXD12URL#4417177Puntitra SawadpongEdward B. AllenByron J. WilliamsException Handling Defects: An Empirical Study.HASE90-972012Conference and Workshop Papersclosedconf/hase/SawadpongAW1210.1109/HASE.2012.24https://doi.org/10.1109/HASE.2012.24https://dblp.org/rec/conf/hase/SawadpongAW12URL#4417178Hossain ShahriarMohammad ZulkernineInformation-Theoretic Detection of SQL Injection Attacks.HASE40-472012Conference and Workshop Papersclosedconf/hase/ShahriarZ1210.1109/HASE.2012.31https://doi.org/10.1109/HASE.2012.31https://dblp.org/rec/conf/hase/ShahriarZ12URL#4417179Raul Schmidlin Fajardo SilvaGuillermo MarcusDevice Mechanism: A Structured Device Driver Development Approach.HASE66-732012Conference and Workshop Papersclosedconf/hase/SilvaM1210.1109/HASE.2012.20https://doi.org/10.1109/HASE.2012.20https://dblp.org/rec/conf/hase/SilvaM12URL#4417180George SpanoudakisErnesto DamianiAntonio MañaCertifying Services in Cloud: The Case for a Hybrid, Incremental and Multi-layer Approach.HASE175-1762012Conference and Workshop Papersclosedconf/hase/SpanoudakisDM1210.1109/HASE.2012.16https://doi.org/10.1109/HASE.2012.16https://dblp.org/rec/conf/hase/SpanoudakisDM12URL#4417181Simon StruckMichael LipaczewskiFrank OrtmeierMatthias GüdemannMulti-objective Optimization of Formal Specifications.HASE201-2082012Conference and Workshop Papersclosedconf/hase/StruckLOG1210.1109/HASE.2012.21https://doi.org/10.1109/HASE.2012.21https://dblp.org/rec/conf/hase/StruckLOG12URL#4417182Victor L. WinterJonathan GuerreroAlexander JamesCarl ReinkeLinking Syntactic and Semantic Models of Java Source Code within a Program Transformation System.HASE122-1292012Conference and Workshop Papersclosedconf/hase/WinterGJR1210.1109/HASE.2012.8https://doi.org/10.1109/HASE.2012.8https://dblp.org/rec/conf/hase/WinterGJR12URL#4417183Leon WuGail E. KaiserAn Autonomic Reliability Improvement System for Cyber-Physical Systems.HASE56-612012Conference and Workshop Papersclosedconf/hase/WuK1210.1109/HASE.2012.33https://doi.org/10.1109/HASE.2012.33https://dblp.org/rec/conf/hase/WuK12URL#4417184Jiexin Zhang 0002Yang Liu 0003Jing Sun 0002Jin Song DongJun Sun 0001Model Checking Software Architecture Design.HASE193-2002012Conference and Workshop Papersclosedconf/hase/Zhang00D01210.1109/HASE.2012.12https://doi.org/10.1109/HASE.2012.12https://dblp.org/rec/conf/hase/Zhang00D012URL#4417185Wenke ZhangFavyen BastaniI-Ling YenKevin HulinFarokh B. BastaniLatifur KhanReal-Time Anomaly Detection in Streams of Execution Traces.HASE32-392012Conference and Workshop Papersclosedconf/hase/ZhangBYHBK1210.1109/HASE.2012.13https://doi.org/10.1109/HASE.2012.13https://dblp.org/rec/conf/hase/ZhangBYHBK12URL#441718614th International IEEE Symposium on High-Assurance Systems Engineering, HASE 2012, Omaha, NE, USA, October 25-27, 2012HASEIEEE Computer Society2012Editorshipconf/hase/2012https://ieeexplore.ieee.org/xpl/conhome/6374352/proceedinghttps://dblp.org/rec/conf/hase/2012URL#4513701Sami S. AlwakeelShaker S. AlGhanmiA Real Time Window-Based Local Call Admission Control Algorithm for IP Networks.HASE163-1672011Conference and Workshop Papersclosedconf/hase/AlwakeelA1110.1109/HASE.2011.32https://doi.org/10.1109/HASE.2011.32https://dblp.org/rec/conf/hase/AlwakeelA11URL#4674931Ayman A. AminAlan ColmanLars GrunskeUsing Automated Control Charts for the Runtime Evaluation of QoS Attributes.HASE299-3062011Conference and Workshop Papersclosedconf/hase/AminCG1110.1109/HASE.2011.20https://doi.org/10.1109/HASE.2011.20https://dblp.org/rec/conf/hase/AminCG11URL#4674932Hicham AssoudiHakim LounisSelf-Healing Data Exchange Process under Evolving Schemas: A New Mapping Adaptation Approach Based on Self-Optimization.HASE188-1902011Conference and Workshop Papersclosedconf/hase/AssoudiL1110.1109/HASE.2011.42https://doi.org/10.1109/HASE.2011.42https://dblp.org/rec/conf/hase/AssoudiL11URL#4674933Aritra BandyopadhyaySudipto GhoshOn the Effectiveness of the Tarantula Fault Localization Technique for Different Fault Classes.HASE317-3242011Conference and Workshop Papersclosedconf/hase/BandyopadhyayG1110.1109/HASE.2011.52https://doi.org/10.1109/HASE.2011.52https://dblp.org/rec/conf/hase/BandyopadhyayG11URL#4674934Mario BernhartStefan ReitererKilian MattAndreas MauczkaThomas GrechenigA Task-Based Code Review Process and Tool to Comply with the DO-278/ED-109 Standard for Air Traffic Managment Software Development: An Industrial Case Study.HASE182-1872011Conference and Workshop Papersclosedconf/hase/BernhartRMMG1110.1109/HASE.2011.54https://doi.org/10.1109/HASE.2011.54https://dblp.org/rec/conf/hase/BernhartRMMG11URL#4674935Debmalya BiswasValtteri NiemiTransforming Privacy Policies to Auditing Specifications.HASE368-3752011Conference and Workshop Papersclosedconf/hase/BiswasN1110.1109/HASE.2011.51https://doi.org/10.1109/HASE.2011.51https://dblp.org/rec/conf/hase/BiswasN11URL#4674936Ingrid A. BuckleyEduardo B. FernándezEnumerating Software Failures to Build Dependable Distributed Applications.HASE120-1232011Conference and Workshop Papersclosedconf/hase/BuckleyF1110.1109/HASE.2011.35https://doi.org/10.1109/HASE.2011.35https://dblp.org/rec/conf/hase/BuckleyF11URL#4674937Andrea CeccarelliMarco VieiraAndrea BondavalliA Testing Service for Lifelong Validation of Dynamic SOA.HASE1-82011Conference and Workshop Papersclosedconf/hase/CeccarelliVB1110.1109/HASE.2011.18https://doi.org/10.1109/HASE.2011.18https://dblp.org/rec/conf/hase/CeccarelliVB11URL#4674938Tushar DeshpandePanagiotis KatsarosStylianos BasagiannisScott A. SmolkaFormal Analysis of the DNS Bandwidth Amplification Attack and Its Countermeasures Using Probabilistic Model Checking.HASE360-3672011Conference and Workshop Papersclosedconf/hase/DeshpandeKBS1110.1109/HASE.2011.57https://doi.org/10.1109/HASE.2011.57https://dblp.org/rec/conf/hase/DeshpandeKBS11URL#4674939Philippe DhaussyJean-Charles RogerFrédéric BoniolReducing State Explosion with Context Modeling for Model-Checking.HASE130-1372011Conference and Workshop Papersclosedconf/hase/DhaussyRB1110.1109/HASE.2011.24https://doi.org/10.1109/HASE.2011.24https://dblp.org/rec/conf/hase/DhaussyRB11URL#4674940Janell DuhaneyTaghi M. KhoshgoftaarJohn C. SloanBassem AlhalabiPierre P. BeaujeanA Dynamometer for an Ocean Turbine Prototype: Reliability through Automated Monitoring.HASE244-2512011Conference and Workshop Papersclosedconf/hase/DuhaneyKSAB1110.1109/HASE.2011.61https://doi.org/10.1109/HASE.2011.61https://dblp.org/rec/conf/hase/DuhaneyKSAB11URL#4674941Lance FiondellaSanguthevar RajasekaranSwapna S. GokhaleEfficient System Reliability with Correlated Component Failures.HASE269-2762011Conference and Workshop Papersclosedconf/hase/FiondellaRG1110.1109/HASE.2011.31https://doi.org/10.1109/HASE.2011.31https://dblp.org/rec/conf/hase/FiondellaRG11URL#4674942Hajime Fujita 0002Yutaka IshikawaAnytime Available Single IP Address Cluster.HASE168-1732011Conference and Workshop Papersclosedconf/hase/FujitaI1110.1109/HASE.2011.53https://doi.org/10.1109/HASE.2011.53https://dblp.org/rec/conf/hase/FujitaI11URL#4674943Javier González 0001Antonio Muñoz 0001Antonio MañaMulti-layer Monitoring for Cloud Computing.HASE291-2982011Conference and Workshop Papersclosedconf/hase/GonzalezMM1110.1109/HASE.2011.65https://doi.org/10.1109/HASE.2011.65https://dblp.org/rec/conf/hase/GonzalezMM11URL#4674944Md. Emdadul HaqueFan WeiTakehiro GoudaXiaodong LuKinji MoriAutonomous Online Expansion Technology for ZigBee Wireless Sensor Networks.HASE174-1752011Conference and Workshop Papersclosedconf/hase/HaqueWGLM1110.1109/HASE.2011.55https://doi.org/10.1109/HASE.2011.55https://dblp.org/rec/conf/hase/HaqueWGLM11URL#4674945Herbert HechtSo Much to Learn from One Accident Crash of 737 on 25 February 2009.HASE348-3512011Conference and Workshop Papersclosedconf/hase/Hecht1110.1109/HASE.2011.45https://doi.org/10.1109/HASE.2011.45https://dblp.org/rec/conf/hase/Hecht11URL#4674946Patrick HeinDebmalya BiswasLeonardo A. MartucciMax MühlhäuserConflict Detection and Lifecycle Management for Access Control in Publish/Subscribe Systems.HASE104-1112011Conference and Workshop Papersclosedconf/hase/HeinBMM1110.1109/HASE.2011.50https://doi.org/10.1109/HASE.2011.50https://dblp.org/rec/conf/hase/HeinBMM11URL#4674947Ali KansoFerhat KhendekAnik MishraMaria ToeroeIntegrating Legacy Applications for High Availability: A Case Study.HASE83-902011Conference and Workshop Papersclosedconf/hase/KansoKMT1110.1109/HASE.2011.39https://doi.org/10.1109/HASE.2011.39https://dblp.org/rec/conf/hase/KansoKMT11URL#4674948Michaël LauerJérôme ErmontFrédéric BoniolClaire PagettiWorst Case Temporal Consistency in Integrated Modular Avionics Systems.HASE212-2192011Conference and Workshop Papersclosedconf/hase/LauerEBP1110.1109/HASE.2011.48https://doi.org/10.1109/HASE.2011.48https://dblp.org/rec/conf/hase/LauerEBP11URL#4674949Dongeun Lee 0001Heonshik ShinEunjeong ParkModeling Recovery Strategies in Service-Oriented Architecture Using a Markov Decision Process.HASE285-2902011Conference and Workshop Papersclosedconf/hase/LeeSP1110.1109/HASE.2011.25https://doi.org/10.1109/HASE.2011.25https://dblp.org/rec/conf/hase/LeeSP11URL#4674950Jianwen LiZheng Wang 0005Yongxin ZhaoGeguang PuYanxia QiBin Gu 0006An Event-B Interpretation for SPARDL Model.HASE41-482011Conference and Workshop Papersclosedconf/hase/LiWZPQG1110.1109/HASE.2011.27https://doi.org/10.1109/HASE.2011.27https://dblp.org/rec/conf/hase/LiWZPQG11URL#4674951Mingjie LinYu Bai 0004John WawrzynekDiscriminatively Fortified Computing with Reconfigurable Digital Fabric.HASE112-1192011Conference and Workshop Papersclosedconf/hase/LinBW1110.1109/HASE.2011.49https://doi.org/10.1109/HASE.2011.49https://dblp.org/rec/conf/hase/LinBW11URL#4674952Si Liu 0001Yongxin ZhaoHuibiao ZhuQin Li 0002A Calculus for Mobile Ad Hoc Networks from a Group Probabilistic Perspective.HASE157-1622011Conference and Workshop Papersclosedconf/hase/LiuZZL1110.1109/HASE.2011.13https://doi.org/10.1109/HASE.2011.13https://dblp.org/rec/conf/hase/LiuZZL11URL#4674953David Lo 0001Hong Cheng 0001Xiaoyin WangBug Signature Minimization and Fusion.HASE340-3472011Conference and Workshop Papersclosedconf/hase/LoCW1110.1109/HASE.2011.36https://doi.org/10.1109/HASE.2011.36https://dblp.org/rec/conf/hase/LoCW11URL#4674954Ilya LopatkinAlexei IliasovAlexander B. RomanovskyYuliya ProkhorovaElena TroubitsynaPatterns for Representing FMEA in Formal Specification of Control Systems.HASE146-1512011Conference and Workshop Papersclosedconf/hase/LopatkinIRPT1110.1109/HASE.2011.10https://doi.org/10.1109/HASE.2011.10https://dblp.org/rec/conf/hase/LopatkinIRPT11URL#4674955Stéphane LouiseMatthieu LemerreChristophe AussaguèsVincent DavidThe OASIS Kernel: A Framework for High Dependability Real-Time Systems.HASE95-1032011Conference and Workshop Papersclosedconf/hase/LouiseLAD1110.1109/HASE.2011.38https://doi.org/10.1109/HASE.2011.38https://dblp.org/rec/conf/hase/LouiseLAD11URL#4674956Mazen El MaarabaniAna R. CavalliIksoon HwangFatiha ZaïdiVerification of Interoperability Security Policies by Model Checking.HASE376-3812011Conference and Workshop Papersclosedconf/hase/MaarabaniCHZ1110.1109/HASE.2011.17https://doi.org/10.1109/HASE.2011.17https://dblp.org/rec/conf/hase/MaarabaniCHZ11URL#4674957Pratik MaheshwariByong-Su SeolJong-Sung LeeJae-Deok LimSahra SedighDavid PommerenkeSoftware-Based Instrumentation for Localization of Faults Caused by Electrostatic Discharge.HASE333-3392011Conference and Workshop Papersclosedconf/hase/MaheshwariSLLSP1110.1109/HASE.2011.64https://doi.org/10.1109/HASE.2011.64https://dblp.org/rec/conf/hase/MaheshwariSLLSP11URL#4674958Antonio MañaJosé Fran. RuizA Security Modelling Framework for Systems of Embedded Components.HASE176-1772011Conference and Workshop Papersclosedconf/hase/ManaR1110.1109/HASE.2011.21https://doi.org/10.1109/HASE.2011.21https://dblp.org/rec/conf/hase/ManaR11URL#4674959Atif MashkoorJean-Pierre JacquotGuidelines for Formal Domain Modeling in Event-B.HASE138-1452011Conference and Workshop Papersclosedconf/hase/MashkoorJ1110.1109/HASE.2011.47https://doi.org/10.1109/HASE.2011.47https://dblp.org/rec/conf/hase/MashkoorJ11URL#4674960Mustapha MjitPierre-Philippe J. BeaujeanDavid J. VendittisSmart Vibration Monitoring System for an Ocean Turbine.HASE252-2602011Conference and Workshop Papersclosedconf/hase/MjitBV1110.1109/HASE.2011.34https://doi.org/10.1109/HASE.2011.34https://dblp.org/rec/conf/hase/MjitBV11URL#4674961Chetan MuthaCarol S. SmidtsAn Early Design Stage UML-Based Safety Analysis Approach for High Assurrance Software Systems.HASE202-2112011Conference and Workshop Papersclosedconf/hase/MuthaS1110.1109/HASE.2011.37https://doi.org/10.1109/HASE.2011.37https://dblp.org/rec/conf/hase/MuthaS11URL#4674962Simin Nadjm-TehraniMaria VasilevskayaTowards a Security Domain Model for Embedded Systems.HASE180-1812011Conference and Workshop Papersclosedconf/hase/Nadjm-TehraniV1110.1109/HASE.2011.19https://doi.org/10.1109/HASE.2011.19https://dblp.org/rec/conf/hase/Nadjm-TehraniV11URL#4674963Kunming NieLi Zhang 0029On the Relationship between Preprocessor-Based Software Variability and Software Defects.HASE178-1792011Conference and Workshop Papersclosedconf/hase/NieZ1110.1109/HASE.2011.44https://doi.org/10.1109/HASE.2011.44https://dblp.org/rec/conf/hase/NieZ11URL#4674964Ricardo PaharsinghOlivia DasAn Availability Model of a Virtual TMR System with Applications in Cloud/Cluster Computing.HASE261-2682011Conference and Workshop Papersclosedconf/hase/PaharsinghD1110.1109/HASE.2011.11https://doi.org/10.1109/HASE.2011.11https://dblp.org/rec/conf/hase/PaharsinghD11URL#4674965Manasi PeshaveFarokh B. BastaniI-Ling YenHigh-Assurance Reconfigurable Multicore Processor Based Systems.HASE220-2262011Conference and Workshop Papersclosedconf/hase/PeshaveBY1110.1109/HASE.2011.33https://doi.org/10.1109/HASE.2011.33https://dblp.org/rec/conf/hase/PeshaveBY11URL#4674966André PflügerWolfgang GolubskiStefan QueinsModel Driven Validation of System Architectures.HASE25-282011Conference and Workshop Papersclosedconf/hase/PflugerGQ1110.1109/HASE.2011.46https://doi.org/10.1109/HASE.2011.46https://dblp.org/rec/conf/hase/PflugerGQ11URL#4674967Douglas RodriguesDaniel F. PigattoJúlio Cezar EstrellaKalinka Regina Lucas Jaquie Castelo BrancoComparison and Analysis of Cryptographic Algorithms Aiming Performance Improvement in Secure Web Services.HASE191-1922011Conference and Workshop Papersclosedconf/hase/RodriguesPEB1110.1109/HASE.2011.69https://doi.org/10.1109/HASE.2011.69https://dblp.org/rec/conf/hase/RodriguesPEB11URL#4674968Mehrdad SabetzadehDavide FalessiLionel C. BriandStefano Di AlesioDag McGeorgeVidar ÅhjemJonas BorgCombining Goal Models, Expert Elicitation, and Probabilistic Simulation for Qualification of New Technology.HASE63-722011Conference and Workshop Papersclosedconf/hase/SabetzadehFBAMAB1110.1109/HASE.2011.22https://doi.org/10.1109/HASE.2011.22https://dblp.org/rec/conf/hase/SabetzadehFBAMAB11URL#4674969Mehrdad SabetzadehShiva NejatiLionel C. BriandAnne-Heidi Evensen MillsUsing SysML for Modeling of Safety-Critical Software-Hardware Interfaces: Guidelines and Industry Experience.HASE193-2012011Conference and Workshop Papersclosedconf/hase/SabetzadehNBM1110.1109/HASE.2011.23https://doi.org/10.1109/HASE.2011.23https://dblp.org/rec/conf/hase/SabetzadehNBM11URL#4674970Michael F. SiokJeff TianBenchmarking Embedded Software Development Project Performance.HASE277-2842011Conference and Workshop Papersclosedconf/hase/SiokT1110.1109/HASE.2011.59https://doi.org/10.1109/HASE.2011.59https://dblp.org/rec/conf/hase/SiokT11URL#4674971John C. SloanTaghi M. KhoshgoftaarEnsemble Coordination for Discrete Event Control.HASE227-2352011Conference and Workshop Papersclosedconf/hase/SloanK1110.1109/HASE.2011.26https://doi.org/10.1109/HASE.2011.26https://dblp.org/rec/conf/hase/SloanK11URL#4674972Wuliang SunRobert B. FranceIndrakshi RaySupporting Iterative Development of Robust Operation Contracts in UML Requirements Models.HASE9-162011Conference and Workshop Papersclosedconf/hase/SunFR1110.1109/HASE.2011.43https://doi.org/10.1109/HASE.2011.43https://dblp.org/rec/conf/hase/SunFR11URL#4674973Zahid A. SyedSean BanerjeeQi ChengBojan CukicEffects of User Habituation in Keystroke Dynamics on Password Security Policy.HASE352-3592011Conference and Workshop Papersclosedconf/hase/SyedBCC1110.1109/HASE.2011.16https://doi.org/10.1109/HASE.2011.16https://dblp.org/rec/conf/hase/SyedBCC11URL#4674974Chuanqi TaoBixin LiJerry Gao 0002Regression Testing of Component-Based Software: A Systematic Practise Based on State Testing.HASE29-322011Conference and Workshop Papersclosedconf/hase/TaoLG1110.1109/HASE.2011.40https://doi.org/10.1109/HASE.2011.40https://dblp.org/rec/conf/hase/TaoLG11URL#4674975Vivek TyagiAbhijit S. PandyaAnkur AgarwalBassem AlhalabiValidation of Object Recognition Framework on Android Mobile Platform.HASE313-3162011Conference and Workshop Papersclosedconf/hase/TyagiPAA1110.1109/HASE.2011.62https://doi.org/10.1109/HASE.2011.62https://dblp.org/rec/conf/hase/TyagiPAA11URL#4674976Vishesh VedVivek TyagiAnkur AgarwalAbhijit S. PandyaPersonal Health Record System and Integration Techniques with Various Electronic Medical Record Systems.HASE91-942011Conference and Workshop Papersclosedconf/hase/VedTAP1110.1109/HASE.2011.63https://doi.org/10.1109/HASE.2011.63https://dblp.org/rec/conf/hase/VedTAP11URL#4674977Mladen A. VoukPierre MouallemOn High-Assurance Scientific Workflows.HASE73-822011Conference and Workshop Papersclosedconf/hase/VoukM1110.1109/HASE.2011.58https://doi.org/10.1109/HASE.2011.58https://dblp.org/rec/conf/hase/VoukM11URL#4674978Randall WaldTaghi M. KhoshgoftaarJohn C. SloanUsing Feature Selection to Determine Optimal Depth for Wavelet Packet Decomposition of Vibration Signals for Ocean System Reliability.HASE236-2432011Conference and Workshop Papersclosedconf/hase/WaldKS1110.1109/HASE.2011.60https://doi.org/10.1109/HASE.2011.60https://dblp.org/rec/conf/hase/WaldKS11URL#4674979Ying WangChunming HuBo Li 0005VMDetector: A VMM-based Platform to Detect Hidden Process by Multi-view Comparison.HASE307-3122011Conference and Workshop Papersclosedconf/hase/WangHL1110.1109/HASE.2011.41https://doi.org/10.1109/HASE.2011.41https://dblp.org/rec/conf/hase/WangHL11URL#4674980Qian WangHuibiao ZhuAnimating the Approach of Deriving Operational Semantics from Algebraic Semantics for Web Services.HASE57-622011Conference and Workshop Papersclosedconf/hase/WangZ1110.1109/HASE.2011.56https://doi.org/10.1109/HASE.2011.56https://dblp.org/rec/conf/hase/WangZ11URL#4674981Victor L. WinterJonathan GuerreroCarl ReinkeJames T. PerryMonarch: A High-Assurance Java-to-Java (J2j) Source-Code Migrator.HASE152-1562011Conference and Workshop Papersclosedconf/hase/WinterGRP1110.1109/HASE.2011.30https://doi.org/10.1109/HASE.2011.30https://dblp.org/rec/conf/hase/WinterGRP11URL#4674982Rui YangZhenyu Chen 0001Baowen XuW. Eric WongJie ZhangImprove the Effectiveness of Test Case Generation on EFSM via Automatic Path Feasibility Analysis.HASE17-242011Conference and Workshop Papersclosedconf/hase/YangCXWZ1110.1109/HASE.2011.12https://doi.org/10.1109/HASE.2011.12https://dblp.org/rec/conf/hase/YangCXWZ11URL#4674983Zhongxing YuHai HuChenggang BaiKai-Yuan CaiW. Eric WongGUI Software Fault Localization Using N-gram Analysis.HASE325-3322011Conference and Workshop Papersclosedconf/hase/YuHBCW1110.1109/HASE.2011.29https://doi.org/10.1109/HASE.2011.29https://dblp.org/rec/conf/hase/YuHBCW11URL#4674984Yingying ZhangEmmanuel RodriguezHao Zheng 0001Chris J. MyersA Behavioral Analysis Approach for Efficient Partial Order Reduction.HASE49-562011Conference and Workshop Papersclosedconf/hase/ZhangRZM1110.1109/HASE.2011.15https://doi.org/10.1109/HASE.2011.15https://dblp.org/rec/conf/hase/ZhangRZM11URL#4674985Wenbing Zhao 0001P. M. Melliar-SmithLouise E. MoserLeader-Determined Membership Protocol.HASE124-1292011Conference and Workshop Papersclosedconf/hase/ZhaoMM1110.1109/HASE.2011.14https://doi.org/10.1109/HASE.2011.14https://dblp.org/rec/conf/hase/ZhaoMM11URL#4674986Yongxin ZhaoZheng Wang 0005Hao XiaoJing PingGeguang PuJifeng He 0001Huibiao ZhuA Unifying Approach to Validating Specification-Oriented XML Constraints.HASE33-402011Conference and Workshop Papersclosedconf/hase/ZhaoWXPPHZ1110.1109/HASE.2011.28https://doi.org/10.1109/HASE.2011.28https://dblp.org/rec/conf/hase/ZhaoWXPPHZ11URL#4674987Taghi M. Khoshgoftaar13th IEEE International Symposium on High-Assurance Systems Engineering, HASE 2011, Boca Raton, FL, USA, November 10-12, 2011HASEIEEE Computer Society2011Editorshipconf/hase/2011https://ieeexplore.ieee.org/xpl/conhome/6113112/proceedinghttps://dblp.org/rec/conf/hase/2011URL#4765106Nikolaos Alexiou 0001Stylianos BasagiannisPanagiotis KatsarosTushar DeshpandeScott A. SmolkaFormal Analysis of the Kaminsky DNS Cache-Poisoning Attack Using Probabilistic Model Checking.HASE94-1032010Conference and Workshop Papersclosedconf/hase/AlexiouBKDS1010.1109/HASE.2010.25https://doi.org/10.1109/HASE.2010.25https://dblp.org/rec/conf/hase/AlexiouBKDS10URL#4912593Franck BarbierCyril BallagnyProved Metamodels as Backbone for Software Adaptation.HASE114-1212010Conference and Workshop Papersclosedconf/hase/BarbierB1010.1109/HASE.2010.12https://doi.org/10.1109/HASE.2010.12https://dblp.org/rec/conf/hase/BarbierB10URL#4912594Marin BertierAchour MostéfaouiGilles TrédanLow-Cost Secret-Sharing in Sensor Networks.HASE1-92010Conference and Workshop Papersclosedconf/hase/BertierMT1010.1109/HASE.2010.16https://doi.org/10.1109/HASE.2010.16https://dblp.org/rec/conf/hase/BertierMT10URL#4912595Thomas BochotPierre VirelizierHélène WaeselynckVirginie WielsPaths to Property Violation: A Structural Approach for Analyzing Counter-Examples.HASE74-832010Conference and Workshop Papersclosedconf/hase/BochotVWW1010.1109/HASE.2010.15https://doi.org/10.1109/HASE.2010.15https://dblp.org/rec/conf/hase/BochotVWW10URL#4912596Richard H. CarverJeff Yu LeiA Stateful Approach to Testing Monitors in Multithreaded Programs.HASE54-632010Conference and Workshop Papersclosedconf/hase/CarverL1010.1109/HASE.2010.14https://doi.org/10.1109/HASE.2010.14https://dblp.org/rec/conf/hase/CarverL10URL#4912597Yunja ChoiHoon JangReverse Engineering Abstract Components for Model-Based Development and Verification of Embedded Software.HASE122-1312010Conference and Workshop Papersclosedconf/hase/ChoiJ1010.1109/HASE.2010.20https://doi.org/10.1109/HASE.2010.20https://dblp.org/rec/conf/hase/ChoiJ10URL#4912598Salvatore DistefanoFrancesco Longo 0001Marco ScarpaSymbolic Representation Techniques in Dynamic Reliability Evaluation.HASE45-532010Conference and Workshop Papersclosedconf/hase/DistefanoLS1010.1109/HASE.2010.28https://doi.org/10.1109/HASE.2010.28https://dblp.org/rec/conf/hase/DistefanoLS10URL#4912599Marco GribaudoAnne RemkeHybrid Petri Nets with General One-Shot Transitions for Dependability Evaluation of Fluid Critical Infrastructures.HASE84-932010Conference and Workshop Papersclosedconf/hase/GribaudoR1010.1109/HASE.2010.27https://doi.org/10.1109/HASE.2010.27https://dblp.org/rec/conf/hase/GribaudoR10URL#4912600Matthias GüdemannFrank OrtmeierA Framework for Qualitative and Quantitative Formal Model-Based Safety Analysis.HASE132-1412010Conference and Workshop Papersclosedconf/hase/GudemannO1010.1109/HASE.2010.24https://doi.org/10.1109/HASE.2010.24https://dblp.org/rec/conf/hase/GudemannO10URL#4912601Jérémie GuiochetDamien Martin-GuillerezDavid PowellExperience with Model-Based User-Centered Risk Assessment for Service Robots.HASE104-1132010Conference and Workshop Papersclosedconf/hase/GuiochetMP1010.1109/HASE.2010.10https://doi.org/10.1109/HASE.2010.10https://dblp.org/rec/conf/hase/GuiochetMP10URL#4912602Frantz IwuScalable Fualt Detection for FPGAs.HASE20-252010Conference and Workshop Papersclosedconf/hase/Iwu1010.1109/HASE.2010.30https://doi.org/10.1109/HASE.2010.30https://dblp.org/rec/conf/hase/Iwu10URL#4912603Yutaka MatsunoHiroki TakamuraYutaka IshikawaA Dependability Case Editor with Pattern Library.HASE170-1712010Conference and Workshop Papersclosedconf/hase/MatsunoTI1010.1109/HASE.2010.26https://doi.org/10.1109/HASE.2010.26https://dblp.org/rec/conf/hase/MatsunoTI10URL#4912604Cuauhtemoc MunozSteve RoachAutomated Testing of LTL Formula Generation by Prospec.HASE168-1692010Conference and Workshop Papersclosedconf/hase/MunozR1010.1109/HASE.2010.31https://doi.org/10.1109/HASE.2010.31https://dblp.org/rec/conf/hase/MunozR10URL#4912605Luca PazziMatteo InterlandiMarco PradelliAutomatic Fault Behavior Detection and Modeling by a State-Based Specification Method.HASE166-1672010Conference and Workshop Papersclosedconf/hase/PazziIP1010.1109/HASE.2010.17https://doi.org/10.1109/HASE.2010.17https://dblp.org/rec/conf/hase/PazziIP10URL#4912606Cobra RahmaniAzad H. AzadmaneshHarvey P. SiyArchitecture-Based Reliability Modeling of Web Services Using Petri Nets.HASE164-1652010Conference and Workshop Papersclosedconf/hase/RahmaniAS1010.1109/HASE.2010.18https://doi.org/10.1109/HASE.2010.18https://dblp.org/rec/conf/hase/RahmaniAS10URL#4912607Pejman SalehiAbdelwahab Hamou-LhadjPietro ColomboFerhat KhendekMaria ToeroeA UML-Based Domain Specific Modeling Language for the Availability Management Framework.HASE35-442010Conference and Workshop Papersclosedconf/hase/SalehiHCKT1010.1109/HASE.2010.21https://doi.org/10.1109/HASE.2010.21https://dblp.org/rec/conf/hase/SalehiHCKT10URL#4912608Naeem SeliyaTaghi M. KhoshgoftaarJason Van HulsePredicting Faults in High Assurance Software.HASE26-342010Conference and Workshop Papersclosedconf/hase/SeliyaKH1010.1109/HASE.2010.29https://doi.org/10.1109/HASE.2010.29https://dblp.org/rec/conf/hase/SeliyaKH10URL#4912609Giuliana Santos VeroneseMiguel Correia 0001Alysson Neves BessaniLau Cheuk LungEBAWA: Efficient Byzantine Agreement for Wide-Area Networks.HASE10-192010Conference and Workshop Papersclosedconf/hase/VeroneseCBL1010.1109/HASE.2010.19https://doi.org/10.1109/HASE.2010.19https://dblp.org/rec/conf/hase/VeroneseCBL10URL#4912610Shige WangDomain-Specific Feature Modeling for High Integrity Vehicle Control System Functional Design.HASE142-1512010Conference and Workshop Papersclosedconf/hase/Wang1010.1109/HASE.2010.23https://doi.org/10.1109/HASE.2010.23https://dblp.org/rec/conf/hase/Wang10URL#4912611Fadi WedyanSudipto GhoshA Dataflow Testing Approach for Aspect-Oriented Programs.HASE64-732010Conference and Workshop Papersclosedconf/hase/WedyanG1010.1109/HASE.2010.13https://doi.org/10.1109/HASE.2010.13https://dblp.org/rec/conf/hase/WedyanG10URL#4912612Liangliang XiaoYunqi YeI-Ling YenFarokh B. BastaniEvaluation and Comparisons of Dependable Distributed Storage Designs for Clouds.HASE152-1612010Conference and Workshop Papersclosedconf/hase/XiaoYYB1010.1109/HASE.2010.22https://doi.org/10.1109/HASE.2010.22https://dblp.org/rec/conf/hase/XiaoYYB10URL#4912613Bo ZhouHiroyuki OkamuraTadashi DohiEnhancing Performance of Random Testing through Markov Chain Monte Carlo Methods.HASE162-1632010Conference and Workshop Papersclosedconf/hase/ZhouOD1010.1109/HASE.2010.11https://doi.org/10.1109/HASE.2010.11https://dblp.org/rec/conf/hase/ZhouOD10URL#491261412th IEEE High Assurance Systems Engineering Symposium, HASE 2010, San Jose, CA, USA, November 3-4, 2010HASEIEEE Computer Society2010Editorshipconf/hase/2010https://ieeexplore.ieee.org/xpl/conhome/5628339/proceedinghttps://dblp.org/rec/conf/hase/2010URL#4998291Robert K. AbercrombieFrederick T. SheldonAli Mili 0001Synopsis of Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission Value.HASE479-4822008Conference and Workshop Papersclosedconf/hase/AbercrombieSM0810.1109/HASE.2008.61https://doi.org/10.1109/HASE.2008.61https://dblp.org/rec/conf/hase/AbercrombieSM08URL#5351701Sheikh Iqbal AhamedMd. Endadul HoqueFarzana RahmanMohammad ZulkernineTowards Secure Trust Bootstrapping in Pervasive Computing Environment.HASE89-962008Conference and Workshop Papersclosedconf/hase/AhamedHRZ0810.1109/HASE.2008.21https://doi.org/10.1109/HASE.2008.21https://dblp.org/rec/conf/hase/AhamedHRZ08URL#5351702Kun BaiPeng Liu 0005A Fine-Grained Damage Management Scheme in a Self-Healing PostgreSQL System.HASE373-3822008Conference and Workshop Papersclosedconf/hase/BaiL0810.1109/HASE.2008.33https://doi.org/10.1109/HASE.2008.33https://dblp.org/rec/conf/hase/BaiL08URL#5351703Raul BarbosaJohan KarlssonOn the Integrity of Lightweight Checkpoints.HASE125-1342008Conference and Workshop Papersclosedconf/hase/BarbosaK0810.1109/HASE.2008.25https://doi.org/10.1109/HASE.2008.25https://dblp.org/rec/conf/hase/BarbosaK08URL#5351704Hakim BelhaouariFrédéric PeschanskiAutomated Generation of Test Cases from Contract-Oriented Specifications: A CSP-Based Approach.HASE219-2282008Conference and Workshop Papersclosedconf/hase/BelhaouariP0810.1109/HASE.2008.15https://doi.org/10.1109/HASE.2008.15https://dblp.org/rec/conf/hase/BelhaouariP08URL#5351705Robin BerthierMichel CukierThe Deployment of a Darknet on an Organization-Wide Network: An Empirical Analysis.HASE59-682008Conference and Workshop Papersclosedconf/hase/BerthierC0810.1109/HASE.2008.54https://doi.org/10.1109/HASE.2008.54https://dblp.org/rec/conf/hase/BerthierC08URL#5351706Robin BerthierDave KormannMichel CukierMatti A. HiltunenGregg VesonderDaniel ShelehedaOn the Comparison of Network Attack Datasets: An Empirical Analysis.HASE39-482008Conference and Workshop Papersclosedconf/hase/BerthierKCHVS0810.1109/HASE.2008.50https://doi.org/10.1109/HASE.2008.50https://dblp.org/rec/conf/hase/BerthierKCHVS08URL#5351707Debmalya BiswasThomas GazagnaireBlaise GenestSmall Logs for Transactional Services: Distinction is Much More Accurate than (Positive) Discrimination.HASE97-1062008Conference and Workshop Papersclosedconf/hase/BiswasGG0810.1109/HASE.2008.24https://doi.org/10.1109/HASE.2008.24https://dblp.org/rec/conf/hase/BiswasGG08URL#5351708Patrick Henrique da S. BritoRogério de LemosCecília M. F. RubiraVerification of Exception Control Flows and Handlers Based on Architectural Scenarios.HASE177-1862008Conference and Workshop Papersclosedconf/hase/BritoLR0810.1109/HASE.2008.11https://doi.org/10.1109/HASE.2008.11https://dblp.org/rec/conf/hase/BritoLR08URL#5351709Zizhong ChenJack J. DongarraA Scalable Checkpoint Encoding Algorithm for Diskless Checkpointing.HASE71-792008Conference and Workshop Papersclosedconf/hase/ChenD0810.1109/HASE.2008.13https://doi.org/10.1109/HASE.2008.13https://dblp.org/rec/conf/hase/ChenD08URL#5351710Danielle ChrunMichel CukierGerry SneeringerOn the Use of Security Metrics Based on Intrusion Prevention System Event Data: An Empirical Analysis.HASE49-582008Conference and Workshop Papersclosedconf/hase/ChrunCS0810.1109/HASE.2008.52https://doi.org/10.1109/HASE.2008.52https://dblp.org/rec/conf/hase/ChrunCS08URL#5351711Wang ChuDepei QianArchitecture Centric System Design for Supporting Reconfiguration of Service Oriented Systems.HASE414-4232008Conference and Workshop Papersclosedconf/hase/ChuQ0810.1109/HASE.2008.34https://doi.org/10.1109/HASE.2008.34https://dblp.org/rec/conf/hase/ChuQ08URL#5351712Reinaldo de Barros CorreiaLuci PirmezLuiz F. Rust da Costa CarmoEvaluating Security Risks following a Compliance Perspective.HASE27-362008Conference and Workshop Papersclosedconf/hase/CorreiaPC0810.1109/HASE.2008.55https://doi.org/10.1109/HASE.2008.55https://dblp.org/rec/conf/hase/CorreiaPC08URL#5351713Kai DuHuaimin WangShuqiang YangYingwen ChenYan WenReliability Design for Large Scale Storage Systems.HASE463-4662008Conference and Workshop Papersclosedconf/hase/DuWYCW0810.1109/HASE.2008.48https://doi.org/10.1109/HASE.2008.48https://dblp.org/rec/conf/hase/DuWYCW08URL#5351714Jonas ElmqvistSimin Nadjm-TehraniFormal Support for Quantitative Analysis of Residual Risks in Safety-Critical Systems.HASE154-1642008Conference and Workshop Papersclosedconf/hase/ElmqvistN0810.1109/HASE.2008.59https://doi.org/10.1109/HASE.2008.59https://dblp.org/rec/conf/hase/ElmqvistN08URL#5351715Mahdi FazeliSeyed Nematollah AhmadianSeyed Ghassem MiremadiA Low Energy Soft Error-Tolerant Register File Architecture for Embedded Processors.HASE109-1162008Conference and Workshop Papersclosedconf/hase/FazeliAM0810.1109/HASE.2008.46https://doi.org/10.1109/HASE.2008.46https://dblp.org/rec/conf/hase/FazeliAM08URL#5351716Julien ForgetFrédéric BoniolDavid LesensClaire PagettiA Multi-Periodic Synchronous Data-Flow Language.HASE251-2602008Conference and Workshop Papersclosedconf/hase/ForgetBLP0810.1109/HASE.2008.47https://doi.org/10.1109/HASE.2008.47https://dblp.org/rec/conf/hase/ForgetBLP08URL#5351717Jicheng FuFarokh B. BastaniI-Ling YenAutomated Discovery of Loop Invariants for High-Assurance Programs Synthesized Using AI Planning Techniques.HASE333-3422008Conference and Workshop Papersclosedconf/hase/FuBY0810.1109/HASE.2008.36https://doi.org/10.1109/HASE.2008.36https://dblp.org/rec/conf/hase/FuBY08URL#5351718Lars GrunskeJun HanA Comparative Study into Architecture-Based Safety Evaluation Methodologies Using AADL's Error Annex and Failure Propagation Models.HASE283-2922008Conference and Workshop Papersclosedconf/hase/GrunskeH0810.1109/HASE.2008.32https://doi.org/10.1109/HASE.2008.32https://dblp.org/rec/conf/hase/GrunskeH08URL#5351719Jifeng He 0001Transaction Calculus.HASE42008Conference and Workshop Papersclosedconf/hase/He0810.1109/HASE.2008.67https://doi.org/10.1109/HASE.2008.67https://dblp.org/rec/conf/hase/He08URL#5351720Éric JaegerThérèse HardinA Few Remarks about Formal Development of Secure Systems.HASE165-1742008Conference and Workshop Papersclosedconf/hase/JaegerH0810.1109/HASE.2008.49https://doi.org/10.1109/HASE.2008.49https://dblp.org/rec/conf/hase/JaegerH08URL#5351721Susmit JhaSumit Kumar Jha 0001Randomization Based Probabilistic Approach to Detect Trojan Circuits.HASE117-1242008Conference and Workshop Papersclosedconf/hase/JhaJ0810.1109/HASE.2008.37https://doi.org/10.1109/HASE.2008.37https://dblp.org/rec/conf/hase/JhaJ08URL#5351722Sumit Kumar Jha 0001Susmit JhaRandom Relaxation Abstractions for Bounded Reachability Analysis of Linear Hybrid Automata: Distributed Randomized Abstractions in Model Checking.HASE147-1532008Conference and Workshop Papersclosedconf/hase/JhaJ08a10.1109/HASE.2008.38https://doi.org/10.1109/HASE.2008.38https://dblp.org/rec/conf/hase/JhaJ08aURL#5351723Miao Jiang 0002Mohammad Ahmad MunawarThomas ReidemeisterPaul A. S. WardDetection and Diagnosis of Recurrent Faults in Software Systems by Invariant Analysis.HASE323-3322008Conference and Workshop Papersclosedconf/hase/JiangMRW0810.1109/HASE.2008.16https://doi.org/10.1109/HASE.2008.16https://dblp.org/rec/conf/hase/JiangMRW08URL#5351724Hun JungMiao JuHao CheZhijun Wang 0001A Fast Performance Analysis Tool for Multicore, Multithreaded Communication Processors.HASE135-1442008Conference and Workshop Papersclosedconf/hase/JungJCW0810.1109/HASE.2008.18https://doi.org/10.1109/HASE.2008.18https://dblp.org/rec/conf/hase/JungJCW08URL#5351725Dae-Kyoo KimSoftware Quality Improvement via Pattern-Based Model Refactoring.HASE293-3022008Conference and Workshop Papersclosedconf/hase/Kim0810.1109/HASE.2008.10https://doi.org/10.1109/HASE.2008.10https://dblp.org/rec/conf/hase/Kim08URL#5351726Eryk KylikowskiRiccardo ScandariatoWouter JoosenUsing Multi-Level Security Annotations to Improve Software Assurance.HASE471-4742008Conference and Workshop Papersclosedconf/hase/KylikowskiSJ0810.1109/HASE.2008.60https://doi.org/10.1109/HASE.2008.60https://dblp.org/rec/conf/hase/KylikowskiSJ08URL#5351727Qin Li 0014Jinpeng HuaiJianxin Li 0002Tianyu WoMinxiong WenHyperMIP: Hypervisor Controlled Mobile IP for Virtual Machine Live Migration across Networks.HASE80-882008Conference and Workshop Papersclosedconf/hase/LiHLWW0810.1109/HASE.2008.19https://doi.org/10.1109/HASE.2008.19https://dblp.org/rec/conf/hase/LiHLWW08URL#5351728Qin Li 0002Huibiao ZhuJifeng He 0001Towards the Service Composition Through Buses.HASE441-4442008Conference and Workshop Papersclosedconf/hase/LiZH0810.1109/HASE.2008.56https://doi.org/10.1109/HASE.2008.56https://dblp.org/rec/conf/hase/LiZH08URL#5351729Khalid Mahmood 0003Satoshi NikiXiaodong LuKinji MoriA Novel Ripple-Based Context-Cognizant Service Discovery Method in Autonomous Decentralized Community System.HASE405-4132008Conference and Workshop Papersclosedconf/hase/MahmoodNLM0810.1109/HASE.2008.39https://doi.org/10.1109/HASE.2008.39https://dblp.org/rec/conf/hase/MahmoodNLM08URL#5351730Masayuki MatsumotoAssurance Technology of System Test Based on Operators' Aspects.HASE52008Conference and Workshop Papersclosedconf/hase/Matsumoto0810.1109/HASE.2008.64https://doi.org/10.1109/HASE.2008.64https://dblp.org/rec/conf/hase/Matsumoto08URL#5351731Atef MohamedMohammad ZulkernineAt What Level of Granularity Should We be Componentizing for Software Reliability?HASE273-2822008Conference and Workshop Papersclosedconf/hase/MohamedZ0810.1109/HASE.2008.14https://doi.org/10.1109/HASE.2008.14https://dblp.org/rec/conf/hase/MohamedZ08URL#5351732Bobji MungamuruHector Garcia-MolinaPrivacy, Preservation and Performance: The 3 P's of Distributed Data Management.HASE392-4012008Conference and Workshop Papersclosedconf/hase/MungamuruG0810.1109/HASE.2008.30https://doi.org/10.1109/HASE.2008.30https://dblp.org/rec/conf/hase/MungamuruG08URL#5351733Holger PeineMarek JawurekStefan MandelSecurity Goal Indicator Trees: A Model of Software Features that Supports Efficient Security Inspection.HASE9-182008Conference and Workshop Papersclosedconf/hase/PeineJM0810.1109/HASE.2008.57https://doi.org/10.1109/HASE.2008.57https://dblp.org/rec/conf/hase/PeineJM08URL#5351734Alfredo Pironti 0001Riccardo SistoFormally Sound Refinement of Spi Calculus Protocol Specifications into Java Code.HASE241-2502008Conference and Workshop Papersclosedconf/hase/PirontiS0810.1109/HASE.2008.27https://doi.org/10.1109/HASE.2008.27https://dblp.org/rec/conf/hase/PirontiS08URL#5351735Kanthakumar PongaliurZubin AbrahamAlex X. LiuLi Xiao 0001Leo C. KempelSecuring Sensor Nodes Against Side Channel Attacks.HASE353-3612008Conference and Workshop Papersclosedconf/hase/PongaliurALXK0810.1109/HASE.2008.26https://doi.org/10.1109/HASE.2008.26https://dblp.org/rec/conf/hase/PongaliurALXK08URL#5351736Fei PuYan ZhangLocalizing Program Errors via Slicing and Reasoning.HASE187-1962008Conference and Workshop Papersclosedconf/hase/PuZ0810.1109/HASE.2008.17https://doi.org/10.1109/HASE.2008.17https://dblp.org/rec/conf/hase/PuZ08URL#5351737Oliviero RiganelliRadu GrosuSamir R. DasC. R. Ramakrishnan 0001Scott A. SmolkaPower Optimization in Fault-Tolerant Mobile Ad Hoc Networks.HASE362-3702008Conference and Workshop Papersclosedconf/hase/RiganelliGDRS0810.1109/HASE.2008.12https://doi.org/10.1109/HASE.2008.12https://dblp.org/rec/conf/hase/RiganelliGDRS08URL#5351738Daniel RobinsonGerald KotonyaA Self-Managing Brokerage Model for Quality Assurance in Service-Oriented Systems.HASE424-4332008Conference and Workshop Papersclosedconf/hase/RobinsonK0810.1109/HASE.2008.28https://doi.org/10.1109/HASE.2008.28https://dblp.org/rec/conf/hase/RobinsonK08URL#5351739Kohei SakuraiPéter BokorNeeraj SuriAiding Modular Design and Verification of Safety-Critical Time-Triggered Systems by Use of Executable Formal Specifications.HASE261-2702008Conference and Workshop Papersclosedconf/hase/SakuraiBS0810.1109/HASE.2008.45https://doi.org/10.1109/HASE.2008.45https://dblp.org/rec/conf/hase/SakuraiBS08URL#5351740Hossain ShahriarMohammad ZulkernineMutation-Based Testing of Format String Bugs.HASE229-2382008Conference and Workshop Papersclosedconf/hase/ShahriarZ0810.1109/HASE.2008.8https://doi.org/10.1109/HASE.2008.8https://dblp.org/rec/conf/hase/ShahriarZ08URL#5351741Hui ShenAliya ViraniJianwei Niu 0001Formalize UML 2 Sequence Diagrams.HASE437-4402008Conference and Workshop Papersclosedconf/hase/ShenVN0810.1109/HASE.2008.51https://doi.org/10.1109/HASE.2008.51https://dblp.org/rec/conf/hase/ShenVN08URL#5351742Mary Lou SoffaPath Sensitive Analysis for Security Flaws.HASE32008Conference and Workshop Papersclosedconf/hase/Soffa0810.1109/HASE.2008.63https://doi.org/10.1109/HASE.2008.63https://dblp.org/rec/conf/hase/Soffa08URL#5351743Hironao TakahashiHafiz Farooq AhmadKinji MoriLayered Memory Architecture for High IO Intensive Information Services to Achieve Timeliness.HASE343-3492008Conference and Workshop Papersclosedconf/hase/TakahashiAM0810.1109/HASE.2008.42https://doi.org/10.1109/HASE.2008.42https://dblp.org/rec/conf/hase/TakahashiAM08URL#5351744Fredrik TörnerPeter ÖhmanAutomotive Safety Case A Qualitative Case Study of Drivers, Usages, and Issues.HASE313-3222008Conference and Workshop Papersclosedconf/hase/TornerO0810.1109/HASE.2008.44https://doi.org/10.1109/HASE.2008.44https://dblp.org/rec/conf/hase/TornerO08URL#5351745Hua WangYao Guo 0001Xiangqun ChenDPAC: A Reuse-Oriented Password Authentication Framework for Improving Password Security.HASE475-4782008Conference and Workshop Papersclosedconf/hase/WangGC0810.1109/HASE.2008.22https://doi.org/10.1109/HASE.2008.22https://dblp.org/rec/conf/hase/WangGC08URL#5351746Wenhua WangSreedevi SampathYu Lei 0001Raghu KackerAn Interaction-Based Test Sequence Generation Approach for Testing Web Applications.HASE209-2182008Conference and Workshop Papersclosedconf/hase/WangSLK0810.1109/HASE.2008.53https://doi.org/10.1109/HASE.2008.53https://dblp.org/rec/conf/hase/WangSLK08URL#5351747Jin WeiGuiping SuMeng XuAn Integrated Model to Analyze Cryptographic Protocols with Colored Petri Nets.HASE457-4602008Conference and Workshop Papersclosedconf/hase/WeiSX0810.1109/HASE.2008.23https://doi.org/10.1109/HASE.2008.23https://dblp.org/rec/conf/hase/WeiSX08URL#5351748Liangliang XiaoI-Ling YenFarokh B. BastaniLow Cost Secure Computation for the General Client-Server Computation Model.HASE19-262008Conference and Workshop Papersclosedconf/hase/XiaoYB0810.1109/HASE.2008.31https://doi.org/10.1109/HASE.2008.31https://dblp.org/rec/conf/hase/XiaoYB08URL#5351749Lingfu XieDu XuQing YaoLei SongA New Fault-Tolerant Wormhole Routing Scheme in Tori with Convex Faults.HASE467-4702008Conference and Workshop Papersclosedconf/hase/XieXYS0810.1109/HASE.2008.40https://doi.org/10.1109/HASE.2008.40https://dblp.org/rec/conf/hase/XieXYS08URL#5351750Yunqi YeI-Ling YenLiangliang XiaoBhavani ThuraisinghamSecure, Highly Available, and High Performance Peer-to-Peer Storage Systems.HASE383-3912008Conference and Workshop Papersclosedconf/hase/YeYXT0810.1109/HASE.2008.43https://doi.org/10.1109/HASE.2008.43https://dblp.org/rec/conf/hase/YeYXT08URL#5351751Jian Zhang 0001Checking Inconsistency of Rule Sets in Active Real-Time Databases.HASE453-4562008Conference and Workshop Papersclosedconf/hase/Zhang0810.1109/HASE.2008.58https://doi.org/10.1109/HASE.2008.58https://dblp.org/rec/conf/hase/Zhang08URL#5351752Pengcheng ZhangBixin LiMingjie SunA Timed Extension of Property Sequence Chart.HASE197-2062008Conference and Workshop Papersclosedconf/hase/ZhangLS0810.1109/HASE.2008.20https://doi.org/10.1109/HASE.2008.20https://dblp.org/rec/conf/hase/ZhangLS08URL#5351753Fan Zhang 0099Xingshe Zhou 0001Junwen ChenYunwei DongA Novel Model for Component-Based Software Reliability Analysis.HASE303-3092008Conference and Workshop Papersclosedconf/hase/ZhangZCD0810.1109/HASE.2008.41https://doi.org/10.1109/HASE.2008.41https://dblp.org/rec/conf/hase/ZhangZCD08URL#5351754Chunying ZhaoKang Zhang 0001A Grammar-Based Reverse Engineering Framework for Behavior Verification.HASE449-4522008Conference and Workshop Papersclosedconf/hase/ZhaoZ0810.1109/HASE.2008.9https://doi.org/10.1109/HASE.2008.9https://dblp.org/rec/conf/hase/ZhaoZ08URL#5351755Zhou ZhouLinzhang WangZhanqi CuiXin Chen 0027Jianhua ZhaoJasmine: A Tool for Model-Driven Runtime Verification with UML Behavioral Models.HASE487-4902008Conference and Workshop Papersclosedconf/hase/ZhouWCCZ0810.1109/HASE.2008.62https://doi.org/10.1109/HASE.2008.62https://dblp.org/rec/conf/hase/ZhouWCCZ08URL#5351756Quan ZuMiaomiao ZhangJing Liu 0012Qingfeng DuDesigning, Modelling and Verifying a Container Terminal System Using UPPAAL.HASE445-4482008Conference and Workshop Papersclosedconf/hase/ZuZLD0810.1109/HASE.2008.35https://doi.org/10.1109/HASE.2008.35https://dblp.org/rec/conf/hase/ZuZLD08URL#5351757Albin ZuccatoSamuel DubusEvren BulutMethodology for Service-Oriented Management of Security Assurance in Communication Infrastructures.HASE483-4862008Conference and Workshop Papersclosedconf/hase/ZuccatoDB0810.1109/HASE.2008.29https://doi.org/10.1109/HASE.2008.29https://dblp.org/rec/conf/hase/ZuccatoDB08URL#535175811th IEEE High Assurance Systems Engineering Symposium, HASE 2008, Nanjing, China, December 3 - 5, 2008HASEIEEE Computer Society2008Editorshipconf/hase/2008https://ieeexplore.ieee.org/xpl/conhome/4708846/proceedinghttps://dblp.org/rec/conf/hase/2008URL#5428201Nasser AlaeddineJeff TianAnalytic Model for Web Anomalies Classification.HASE395-3962007Conference and Workshop Papersclosedconf/hase/AlaeddineT0710.1109/HASE.2007.13https://doi.org/10.1109/HASE.2007.13https://dblp.org/rec/conf/hase/AlaeddineT07URL#5546153Masato AsadaTomoyuki OhtaKenji IshidaYoshiaki KakudaDevelopment of Custom Selling System Using Ad Hoc Networks.HASE397-3982007Conference and Workshop Papersclosedconf/hase/AsadaOIK0710.1109/HASE.2007.60https://doi.org/10.1109/HASE.2007.60https://dblp.org/rec/conf/hase/AsadaOIK07URL#5546154Ismail AssayadSergio YovineModelling and Exploration Environment for Application Specific Multiprocessor Systems.HASE433-4342007Conference and Workshop Papersclosedconf/hase/AssayadY0710.1109/HASE.2007.12https://doi.org/10.1109/HASE.2007.12https://dblp.org/rec/conf/hase/AssayadY07URL#5546155Nitin AuluckDuplication Based Integrated Task and Message Scheduling on a Heterogeneous Network of Workstations (NOWs).HASE429-4302007Conference and Workshop Papersclosedconf/hase/Auluck0710.1109/HASE.2007.20https://doi.org/10.1109/HASE.2007.20https://dblp.org/rec/conf/hase/Auluck07URL#5546156Péter BokorMarco SerafiniÁron SisakAndrás PatariczaNeeraj SuriSustaining Property Verification of Synchronous Dependable Protocols Over Implementation.HASE169-1782007Conference and Workshop Papersclosedconf/hase/BokorSSPS0710.1109/HASE.2007.50https://doi.org/10.1109/HASE.2007.50https://dblp.org/rec/conf/hase/BokorSSPS07URL#5546157Stefan BrüningStephan WeißlederMiroslaw MalekA Fault Taxonomy for Service-Oriented Architecture.HASE367-3682007Conference and Workshop Papersclosedconf/hase/BruningWM0710.1109/HASE.2007.46https://doi.org/10.1109/HASE.2007.46https://dblp.org/rec/conf/hase/BruningWM07URL#5546158Wei-Ngan ChinCristina DavidHuu Hai NguyenShengchao QinMultiple Pre/Post Specifications for Heap-Manipulating Methods.HASE357-3642007Conference and Workshop Papersclosedconf/hase/ChinDNQ0710.1109/HASE.2007.19https://doi.org/10.1109/HASE.2007.19https://dblp.org/rec/conf/hase/ChinDNQ07URL#5546159Stephen W. CookBjarne StroustrupScott M. PikeAn Early-Reply Based Framework: Reliable Concurrency that Is Verifiable.HASE405-4062007Conference and Workshop Papersclosedconf/hase/CookSP0710.1109/HASE.2007.54https://doi.org/10.1109/HASE.2007.54https://dblp.org/rec/conf/hase/CookSP07URL#5546160Asesh DasInformation Assurance Architecture with Storyboarding Models.HASE377-3782007Conference and Workshop Papersclosedconf/hase/Das0710.1109/HASE.2007.23https://doi.org/10.1109/HASE.2007.23https://dblp.org/rec/conf/hase/Das07URL#5546161Michael D. DiRossiTowards a High Assurance Secure Computing Platform.HASE381-3822007Conference and Workshop Papersclosedconf/hase/DiRossi0710.1109/HASE.2007.25https://doi.org/10.1109/HASE.2007.25https://dblp.org/rec/conf/hase/DiRossi07URL#5546162P. C. DonachyRonald H. PerrottTerence J. HarmerF. SharkeyFinance Sector: Requirements for High Assurance within Spatial SOA Based Grid Infrastructures.HASE387-3882007Conference and Workshop Papersclosedconf/hase/DonachyPHS0710.1109/HASE.2007.45https://doi.org/10.1109/HASE.2007.45https://dblp.org/rec/conf/hase/DonachyPHS07URL#5546163Lihua DuanJessica ChenA Formal Approach to Website Maintenance.HASE419-4202007Conference and Workshop Papersclosedconf/hase/DuanC0710.1109/HASE.2007.52https://doi.org/10.1109/HASE.2007.52https://dblp.org/rec/conf/hase/DuanC07URL#5546164Lihua DuanYan Wang 0014Jessica ChenEnhanced Traverse of Web Pages.HASE113-1222007Conference and Workshop Papersclosedconf/hase/DuanWC0710.1109/HASE.2007.10https://doi.org/10.1109/HASE.2007.10https://dblp.org/rec/conf/hase/DuanWC07URL#5546165Joanne Bechta DuganGanesh J. PaiHong XuCombining Software Quality Analysis with Dynamic Event/Fault Trees for High Assurance Systems Engineering.HASE245-2552007Conference and Workshop Papersclosedconf/hase/DuganPX0710.1109/HASE.2007.73https://doi.org/10.1109/HASE.2007.73https://dblp.org/rec/conf/hase/DuganPX07URL#5546166Ali EbnenasirBetty H. C. ChengPattern-Based Modeling and Analysis of Failsafe Fault-Tolerance in UML.HASE275-2822007Conference and Workshop Papersclosedconf/hase/EbnenasirC0710.1109/HASE.2007.47https://doi.org/10.1109/HASE.2007.47https://dblp.org/rec/conf/hase/EbnenasirC07URL#5546167Jean-Paul EtienneSamia Bouzefrane 0001A Typed Compositional Language for Real-Time Systems.HASE63-722007Conference and Workshop Papersclosedconf/hase/EtienneB0710.1109/HASE.2007.22https://doi.org/10.1109/HASE.2007.22https://dblp.org/rec/conf/hase/EtienneB07URL#5546168David Y. FeinsteinV. S. S. NairMitchell A. ThorntonAdvances in Quantum Computing Fault Tolerance and Testing.HASE369-3702007Conference and Workshop Papersclosedconf/hase/FeinsteinNT0710.1109/HASE.2007.53https://doi.org/10.1109/HASE.2007.53https://dblp.org/rec/conf/hase/FeinsteinNT07URL#5546169John S. FitzgeraldSimon TjellPeter Gorm LarsenMarcel VerhoefValidation Support for Distributed Real-Time Embedded Systems in VDM++.HASE331-3402007Conference and Workshop Papersclosedconf/hase/FitzgeraldTLV0710.1109/HASE.2007.26https://doi.org/10.1109/HASE.2007.26https://dblp.org/rec/conf/hase/FitzgeraldTLV07URL#5546170Luis García 0008Steve RoachModel-Checker-Based Testing of LTL Specifications.HASE417-4182007Conference and Workshop Papersclosedconf/hase/GarciaR0710.1109/HASE.2007.34https://doi.org/10.1109/HASE.2007.34https://dblp.org/rec/conf/hase/GarciaR07URL#5546171Matthew GillenKurt RohloffPrakash ManghwaniRichard E. SchantzScalable, Adaptive, Time-Bounded Node Failure Detection.HASE179-1862007Conference and Workshop Papersclosedconf/hase/GillenRMS0710.1109/HASE.2007.9https://doi.org/10.1109/HASE.2007.9https://dblp.org/rec/conf/hase/GillenRMS07URL#5546172Heather GoldsbySascha KonradBetty H. C. ChengGoal-Oriented Patterns for UML-Based Modeling of Embedded Systems Requirements.HASE7-142007Conference and Workshop Papersclosedconf/hase/GoldsbyKC0710.1109/HASE.2007.21https://doi.org/10.1109/HASE.2007.21https://dblp.org/rec/conf/hase/GoldsbyKC07URL#5546173Marc HaberkornKishor S. TrivediAvailability Monitor for a Software Based System.HASE321-3282007Conference and Workshop Papersclosedconf/hase/HaberkornT0710.1109/HASE.2007.49https://doi.org/10.1109/HASE.2007.49https://dblp.org/rec/conf/hase/HaberkornT07URL#5546174Jon G. HallDerek ManneringLucia RapanottiArguing safety with Problem Oriented Software Engineering.HASE23-322007Conference and Workshop Papersclosedconf/hase/HallMR0710.1109/HASE.2007.44https://doi.org/10.1109/HASE.2007.44https://dblp.org/rec/conf/hase/HallMR07URL#5546175Ravishankar K. IyerTRUSTED ILLIAC: A Configurable Hardware Framework for a Trusted Computing Base.HASE32007Conference and Workshop Papersclosedconf/hase/Iyer0710.1109/HASE.2007.79https://doi.org/10.1109/HASE.2007.79https://dblp.org/rec/conf/hase/Iyer07URL#5546176Anjali JoshiMats Per Erik HeimdahlBehavioral Fault Modeling for Model-based Safety Analysis.HASE199-2082007Conference and Workshop Papersclosedconf/hase/JoshiH0710.1109/HASE.2007.58https://doi.org/10.1109/HASE.2007.58https://dblp.org/rec/conf/hase/JoshiH07URL#5546177Eze KamanuPratapa ReddyKenneth HsuMarcin LukowiakA New Architecture for Single-Event Detection & Reconfiguration of SRAM-based FPGAs.HASE291-2982007Conference and Workshop Papersclosedconf/hase/KamanuRHL0710.1109/HASE.2007.68https://doi.org/10.1109/HASE.2007.68https://dblp.org/rec/conf/hase/KamanuRHL07URL#5546178Jinyoo KimYashwant K. MalaiyaIndrakshi RayVulnerability Discovery in Multi-Version Software Systems.HASE141-1482007Conference and Workshop Papersclosedconf/hase/KimMR0710.1109/HASE.2007.55https://doi.org/10.1109/HASE.2007.55https://dblp.org/rec/conf/hase/KimMR07URL#5546179Silke KuballHow can Previous Component Use Contribute to Assessing the Use of COTS?HASE123-1302007Conference and Workshop Papersclosedconf/hase/Kuball0710.1109/HASE.2007.48https://doi.org/10.1109/HASE.2007.48https://dblp.org/rec/conf/hase/Kuball07URL#5546180Ronald J. LeachPreliminary Models of the Cost of Fault Tolerance.HASE371-3722007Conference and Workshop Papersclosedconf/hase/Leach0710.1109/HASE.2007.11https://doi.org/10.1109/HASE.2007.11https://dblp.org/rec/conf/hase/Leach07URL#5546181Jason D. LeePraveen BhojwaniRabi N. MahapatraA Safety Analysis Framework for COTS Microprocessors in Safety-Critical Applications.HASE407-4082007Conference and Workshop Papersclosedconf/hase/LeeBM0710.1109/HASE.2007.66https://doi.org/10.1109/HASE.2007.66https://dblp.org/rec/conf/hase/LeeBM07URL#5546182Jeong-Oog LeeHo-Jun LeeBuilding High Assurance Multidisciplinary Design Optimization Framework.HASE391-3922007Conference and Workshop Papersclosedconf/hase/LeeL0710.1109/HASE.2007.32https://doi.org/10.1109/HASE.2007.32https://dblp.org/rec/conf/hase/LeeL07URL#5546183Jeong-Oog LeeDae Hee WonSangkyung SungTaesam KangYoung Jae LeeHigh Assurance GPS Integrity Monitoring System Using Particle Filtering Approach.HASE437-4382007Conference and Workshop Papersclosedconf/hase/LeeWSKL0710.1109/HASE.2007.31https://doi.org/10.1109/HASE.2007.31https://dblp.org/rec/conf/hase/LeeWSKL07URL#5546184Wu-Hon F. LeungOn the Verifiability of Programs Written in the Feature Language Extensions.HASE256-2632007Conference and Workshop Papersclosedconf/hase/Leung0710.1109/HASE.2007.72https://doi.org/10.1109/HASE.2007.72https://dblp.org/rec/conf/hase/Leung07URL#5546185Xiaohu LiT. Paul ParkerShouhuai XuA Stochastic Characterization of a Fault-Tolerant Gossip Algorithm.HASE283-2902007Conference and Workshop Papersclosedconf/hase/LiPX0710.1109/HASE.2007.14https://doi.org/10.1109/HASE.2007.14https://dblp.org/rec/conf/hase/LiPX07URL#5546186Shaoying LiuUtilizing Test Case Generation to Inspect Formal Specifications for Completeness and Feasibility.HASE349-3562007Conference and Workshop Papersclosedconf/hase/Liu0710.1109/HASE.2007.15https://doi.org/10.1109/HASE.2007.15https://dblp.org/rec/conf/hase/Liu07URL#5546187Yan Liu 0003Michael JiangDavid RaymerAdding Autonomic Capabilities to Network Fault Management System.HASE373-3742007Conference and Workshop Papersclosedconf/hase/LiuJR0710.1109/HASE.2007.62https://doi.org/10.1109/HASE.2007.62https://dblp.org/rec/conf/hase/LiuJR07URL#5546188Wissam MallouliAna R. CavalliTesting Security Rules with Decomposable Activities.HASE149-1552007Conference and Workshop Papersclosedconf/hase/MallouliC0710.1109/HASE.2007.41https://doi.org/10.1109/HASE.2007.41https://dblp.org/rec/conf/hase/MallouliC07URL#5546189Manish MarwahShivakant MishraChristof FetzerSystems Architectures for Transactional Network Interface.HASE45-522007Conference and Workshop Papersclosedconf/hase/MarwahMF0710.1109/HASE.2007.69https://doi.org/10.1109/HASE.2007.69https://dblp.org/rec/conf/hase/MarwahMF07URL#5546190Manuel MendonçaNuno Ferreira NevesFuzzing Wi-Fi Drivers to Locate Security Vulnerabilities.HASE379-3802007Conference and Workshop Papersclosedconf/hase/MendoncaN0710.1109/HASE.2007.43https://doi.org/10.1109/HASE.2007.43https://dblp.org/rec/conf/hase/MendoncaN07URL#5546191Ali Mili 0001Frederick T. SheldonMeasuring Reliability as a Mean Failure Cost.HASE403-4042007Conference and Workshop Papersclosedconf/hase/MiliS0710.1109/HASE.2007.42https://doi.org/10.1109/HASE.2007.42https://dblp.org/rec/conf/hase/MiliS07URL#5546192Atef MohamedMohammad ZulkernineImproving Reliability and Safety by Trading off Software Failure Criticalities.HASE267-2742007Conference and Workshop Papersclosedconf/hase/MohamedZ0710.1109/HASE.2007.39https://doi.org/10.1109/HASE.2007.39https://dblp.org/rec/conf/hase/MohamedZ07URL#5546193Branson W. MurrillAutomated Test Data Generation and Reliability Assessment for Software in High Assurance Systems.HASE409-4102007Conference and Workshop Papersclosedconf/hase/Murrill0710.1109/HASE.2007.63https://doi.org/10.1109/HASE.2007.63https://dblp.org/rec/conf/hase/Murrill07URL#5546194Ekpe OkoraforAll-Optical Routing for High Assurance Computer Systems.HASE427-4282007Conference and Workshop Papersclosedconf/hase/Okorafor0710.1109/HASE.2007.18https://doi.org/10.1109/HASE.2007.18https://dblp.org/rec/conf/hase/Okorafor07URL#5546195David Lorge ParnasSergiy A. VilkomirPrecise Documentation of Critical Software.HASE237-2442007Conference and Workshop Papersclosedconf/hase/ParnasV0710.1109/HASE.2007.70https://doi.org/10.1109/HASE.2007.70https://dblp.org/rec/conf/hase/ParnasV07URL#5546196Simon M. PouldingPaul EmbersonIain BateJohn A. ClarkAn Efficient Experimental Methodology for Configuring Search-Based Design Algorithms.HASE53-622007Conference and Workshop Papersclosedconf/hase/PouldingEBC0710.1109/HASE.2007.27https://doi.org/10.1109/HASE.2007.27https://dblp.org/rec/conf/hase/PouldingEBC07URL#5546197Ajitha RajanMichael W. WhalenMats Per Erik HeimdahlModel Validation using Automatically Generated Requirements-Based Tests.HASE95-1042007Conference and Workshop Papersclosedconf/hase/RajanWH0710.1109/HASE.2007.57https://doi.org/10.1109/HASE.2007.57https://dblp.org/rec/conf/hase/RajanWH07URL#5546198Kurt RohloffJoseph P. LoyallPartha P. PalRichard E. SchantzHigh-Assurance Distributed, Adaptive Software for Dynamic Systems.HASE385-3862007Conference and Workshop Papersclosedconf/hase/RohloffLPS0710.1109/HASE.2007.17https://doi.org/10.1109/HASE.2007.17https://dblp.org/rec/conf/hase/RohloffLPS07URL#5546199Francesco RomaniSilvano ChiaradonnaFelicita Di GiandomenicoLuca SimonciniSimulation Models and Implementation of a Simulator for the Performability Analysis of Electric Power Systems Considering Interdependencies.HASE305-3122007Conference and Workshop Papersclosedconf/hase/RomaniCGS0710.1109/HASE.2007.24https://doi.org/10.1109/HASE.2007.24https://dblp.org/rec/conf/hase/RomaniCGS07URL#5546200Alexander B. RomanovskyOn Exceptions, Exception Handling, Requirements and Software Lifecycle.HASE3012007Conference and Workshop Papersclosedconf/hase/Romanovsky0710.1109/HASE.2007.71https://doi.org/10.1109/HASE.2007.71https://dblp.org/rec/conf/hase/Romanovsky07URL#5546201Eduardo Rafael López RuizMethodology for Evaluating Aeronautical Regulations using Formal Specifications.HASE415-4162007Conference and Workshop Papersclosedconf/hase/Ruiz0710.1109/HASE.2007.36https://doi.org/10.1109/HASE.2007.36https://dblp.org/rec/conf/hase/Ruiz07URL#5546202Salamah SalamahAnn Q. GatesVladik KreinovichSteve RoachVerification of Automatically Generated Pattern-Based LTL Specifications.HASE341-3482007Conference and Workshop Papersclosedconf/hase/SalamahGKR0710.1109/HASE.2007.37https://doi.org/10.1109/HASE.2007.37https://dblp.org/rec/conf/hase/SalamahGKR07URL#5546203Jawwad ShamsiMonica BrockmeyerSyncProbe: Providing Assurance of Message Latency through Predictive Monitoring of Internet Paths.HASE187-1962007Conference and Workshop Papersclosedconf/hase/ShamsiB0710.1109/HASE.2007.33https://doi.org/10.1109/HASE.2007.33https://dblp.org/rec/conf/hase/ShamsiB07URL#5546204Wei SheBhavani ThuraisinghamI-Ling YenDelegation-Based Security Model for Web Services.HASE82-912007Conference and Workshop Papersclosedconf/hase/SheTY0710.1109/HASE.2007.76https://doi.org/10.1109/HASE.2007.76https://dblp.org/rec/conf/hase/SheTY07URL#5546205Akio ShiibashiTsuyoshi NakaniwaMotoharu YamanaKinji MoriMulti-layered Data Consistency Technology, An Enhanced Autonomous Decentralized Data Consistency Technology for IC Card Ticket System.HASE219-2262007Conference and Workshop Papersclosedconf/hase/ShiibashiNYM0710.1109/HASE.2007.59https://doi.org/10.1109/HASE.2007.59https://dblp.org/rec/conf/hase/ShiibashiNYM07URL#5546206Sung-Ook ShinJung-Oog LeeDoo-Kwon BaikA Mobile Agent-based Multi-Robot Design Method for High-Assurance.HASE389-3902007Conference and Workshop Papersclosedconf/hase/ShinLB0710.1109/HASE.2007.30https://doi.org/10.1109/HASE.2007.30https://dblp.org/rec/conf/hase/ShinLB07URL#5546207Miyoung ShinSunida RatanothayanonAmrit L. GoelRaymond A. PaulParsimonious Classifiers for Software Quality Assessment.HASE411-4122007Conference and Workshop Papersclosedconf/hase/ShinRGP0710.1109/HASE.2007.75https://doi.org/10.1109/HASE.2007.75https://dblp.org/rec/conf/hase/ShinRGP07URL#5546208Michael F. SiokJeff TianEmpirical Study of Embedded Software Quality and Productivity.HASE313-3202007Conference and Workshop Papersclosedconf/hase/SiokT0710.1109/HASE.2007.67https://doi.org/10.1109/HASE.2007.67https://dblp.org/rec/conf/hase/SiokT07URL#5546209Hongyu Sun 0001Miriam HauptmanRobyn R. LutzIntegrating Product-Line Fault Tree Analysis into AADL Models.HASE15-222007Conference and Workshop Papersclosedconf/hase/SunHL0710.1109/HASE.2007.28https://doi.org/10.1109/HASE.2007.28https://dblp.org/rec/conf/hase/SunHL07URL#5546210Paul TownendNik LookerDacheng ZhangJie Xu 0007Jianxin Li 0002Liang ZhongJinpeng HuaiCROWN-C: A High-Assurance Service-Oriented Grid Middleware System.HASE35-442007Conference and Workshop Papersclosedconf/hase/TownendLZXLZH0710.1109/HASE.2007.56https://doi.org/10.1109/HASE.2007.56https://dblp.org/rec/conf/hase/TownendLZXLZH07URL#5546211Wei-Tek TsaiXinyu ZhouRaymond A. PaulYinong ChenXiaoying BaiA Coverage Relationship Model for Test Case Selection and Ranking for Multi-version Software.HASE105-1122007Conference and Workshop Papersclosedconf/hase/TsaiZPCB0710.1109/HASE.2007.64https://doi.org/10.1109/HASE.2007.64https://dblp.org/rec/conf/hase/TsaiZPCB07URL#5546212Manghui TuNasser TadayonZhonghang XiaEnyue LuA Secure and Scalable Update Protocol for P2P Data Grids.HASE423-4242007Conference and Workshop Papersclosedconf/hase/TuTXL0710.1109/HASE.2007.40https://doi.org/10.1109/HASE.2007.40https://dblp.org/rec/conf/hase/TuTXL07URL#5546213Manghui TuLiangliang XiaoHui Ma 0006I-Ling YenFarokh B. BastaniPlacement in Dependable and Secure Peer-to-Peer Data Grids.HASE133-1402007Conference and Workshop Papersclosedconf/hase/TuXMYB0710.1109/HASE.2007.51https://doi.org/10.1109/HASE.2007.51https://dblp.org/rec/conf/hase/TuXMYB07URL#5546214Jeffrey M. VoasKeith W. Miller 0001One in a Baker's Dozen: Debugging Debugging.HASE75-812007Conference and Workshop Papersclosedconf/hase/VoasM0710.1109/HASE.2007.74https://doi.org/10.1109/HASE.2007.74https://dblp.org/rec/conf/hase/VoasM07URL#5546215Shige WangModel Transformation for High-Integrity Software Development in Derivative Vehicle Control System Design.HASE227-2342007Conference and Workshop Papersclosedconf/hase/Wang0710.1109/HASE.2007.16https://doi.org/10.1109/HASE.2007.16https://dblp.org/rec/conf/hase/Wang07URL#5546216Xin Wang 0002Xiaochen ZhangShuang YangXiangyang XueDesign of a Fairness Guarantee Mechanism Based on Network Measurement.HASE425-4262007Conference and Workshop Papersclosedconf/hase/WangZYX0710.1109/HASE.2007.35https://doi.org/10.1109/HASE.2007.35https://dblp.org/rec/conf/hase/WangZYX07URL#5546217Victor L. WinterAzamatbek MametjanovSteven E. MorrisonJames A. McCoyGregory L. WickstromTransformation-Based Library Adaptation for Embedded Systems.HASE209-2182007Conference and Workshop Papersclosedconf/hase/WinterMMMW0710.1109/HASE.2007.38https://doi.org/10.1109/HASE.2007.38https://dblp.org/rec/conf/hase/WinterMMMW07URL#5546218Shaofei WuShixian WangResearch on Noise Problem of Reputation Estimation in Virtual Enterprise.HASE399-4002007Conference and Workshop Papersclosedconf/hase/WuW0710.1109/HASE.2007.61https://doi.org/10.1109/HASE.2007.61https://dblp.org/rec/conf/hase/WuW07URL#5546219Xinwen ZhangQi Li 0002Jean-Pierre SeifertMingwei XuFlexible Authorization with Decentralized Access Control Model for Grid Computing.HASE156-1652007Conference and Workshop Papersclosedconf/hase/ZhangLSX0710.1109/HASE.2007.29https://doi.org/10.1109/HASE.2007.29https://dblp.org/rec/conf/hase/ZhangLSX07URL#5546220Qi ZhangCarlos RendónVeronica Montes De OcaDaniel R. JeskeMazda MarvastiA Nonparametric Cusum Algorithm for Timeslot Sequences with Applications to Network Surveillance.HASE435-4362007Conference and Workshop Papersclosedconf/hase/ZhangROJM0710.1109/HASE.2007.65https://doi.org/10.1109/HASE.2007.65https://dblp.org/rec/conf/hase/ZhangROJM07URL#5546221Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), November 14-16, 2007, Dallas, Texas, USAHASEIEEE Computer Society2007Editorshipconf/hase/2007https://ieeexplore.ieee.org/xpl/conhome/4404711/proceedinghttps://dblp.org/rec/conf/hase/2007URL#5621092T. Scott AnkrumAlfred H. KromholzStructured Assurance Cases: Three Common Standards.HASE99-1082005Conference and Workshop Papersclosedconf/hase/AnkrumK0510.1109/HASE.2005.20https://doi.org/10.1109/HASE.2005.20https://dblp.org/rec/conf/hase/AnkrumK05URL#5896330Iain BatePhilippa ConmySafe Composition of Real Time Software.HASE79-882005Conference and Workshop Papersclosedconf/hase/BateC0510.1109/HASE.2005.19https://doi.org/10.1109/HASE.2005.19https://dblp.org/rec/conf/hase/BateC05URL#5896331Dejan DesovskiYan Liu 0003Bojan CukicLinear Randomized Voting Algorithm for Fault Tolerant Sensor Fusion and the Corresponding Reliability Model.HASE153-1622005Conference and Workshop Papersclosedconf/hase/DesovskiLC0510.1109/HASE.2005.9https://doi.org/10.1109/HASE.2005.9https://dblp.org/rec/conf/hase/DesovskiLC05URL#5896332Péter DomokosIstván MajzikDesign and Analysis of Fault Tolerant Architectures by Model Weaving.HASE15-242005Conference and Workshop Papersclosedconf/hase/DomokosM0510.1109/HASE.2005.8https://doi.org/10.1109/HASE.2005.8https://dblp.org/rec/conf/hase/DomokosM05URL#5896333Francesco FlamminiNicola MazzoccaMauro IaconoStefano Marrone 0001Using Repairable Fault Trees for the Evaluation of Design Choices for Critical Repairable Systems.HASE163-1722005Conference and Workshop Papersclosedconf/hase/FlamminiMIM0510.1109/HASE.2005.26https://doi.org/10.1109/HASE.2005.26https://dblp.org/rec/conf/hase/FlamminiMIM05URL#5896334Stefan GossensFevzi BelliSami BeydedaMario Dal CinView Graphs for Analysis and Testing of Programs at Different Abstraction Levels.HASE121-1302005Conference and Workshop Papersclosedconf/hase/GossensBBC0510.1109/HASE.2005.27https://doi.org/10.1109/HASE.2005.27https://dblp.org/rec/conf/hase/GossensBBC05URL#5896335Constance L. HeitmeyerA Panacea or Academic Poppycock: Formal Methods Revisited.HASE3-72005Conference and Workshop Papersclosedconf/hase/Heitmeyer0510.1109/HASE.2005.3https://doi.org/10.1109/HASE.2005.3https://dblp.org/rec/conf/hase/Heitmeyer05URL#5896336Martin Jung 0006Francesca SagliettiSupporting Component and Architectural Re-usage by Detection and Tolerance of Integration Faults.HASE47-552005Conference and Workshop Papersclosedconf/hase/JungS0510.1109/HASE.2005.21https://doi.org/10.1109/HASE.2005.21https://dblp.org/rec/conf/hase/JungS05URL#5896337Naoki Kobayashi 0005Tadashi DohiBayesian Perspective of Optimal Checkpoint Placement.HASE143-1522005Conference and Workshop Papersclosedconf/hase/KobayashiT0510.1109/HASE.2005.7https://doi.org/10.1109/HASE.2005.7https://dblp.org/rec/conf/hase/KobayashiT05URL#5896338Yu LeiW. Eric WongA Novel Framework for Non-Deterministic Testing of Message-Passing Programs.HASE66-752005Conference and Workshop Papersclosedconf/hase/LeiW0510.1109/HASE.2005.2https://doi.org/10.1109/HASE.2005.2https://dblp.org/rec/conf/hase/LeiW05URL#5896339Gilles MullerJulia L. LawallHervé DuchesneA Framework for Simplifying the Development of Kernel Schedulers: Design and Performance Evaluation.HASE56-652005Conference and Workshop Papersclosedconf/hase/MullerLD0510.1109/HASE.2005.1https://doi.org/10.1109/HASE.2005.1https://dblp.org/rec/conf/hase/MullerLD05URL#5896340Raymond A. PaulTomorrow's Needs - Yesterday's Technology: DOD's Architectural Dilemma and Plan for Resolution.HASE9-122005Conference and Workshop Papersclosedconf/hase/Paul0510.1109/HASE.2005.25https://doi.org/10.1109/HASE.2005.25https://dblp.org/rec/conf/hase/Paul05URL#5896341Gergely PintérIstván MajzikAutomatic Generation of Executable Assertions for Runtime Checking Temporal Requirements.HASE111-1202005Conference and Workshop Papersclosedconf/hase/PinterM0510.1109/HASE.2005.6https://doi.org/10.1109/HASE.2005.6https://dblp.org/rec/conf/hase/PinterM05URL#5896342Laurent SagaspeGérard BelPierre BieberFrédéric BoniolCharles CastelSafe Allocation of Avionics Shared Resources.HASE25-332005Conference and Workshop Papersclosedconf/hase/SagaspeBBBC0510.1109/HASE.2005.18https://doi.org/10.1109/HASE.2005.18https://dblp.org/rec/conf/hase/SagaspeBBBC05URL#5896343Naeem SeliyaTaghi M. KhoshgoftaarShi ZhongAnalyzing Software Quality with Limited Fault-Proneness Defect Data.HASE89-982005Conference and Workshop Papersclosedconf/hase/SeliyaKZ0510.1109/HASE.2005.4https://doi.org/10.1109/HASE.2005.4https://dblp.org/rec/conf/hase/SeliyaKZ05URL#5896344Andrea ServidaThe Future EU R&D on Security and Dependability: Moving Towards Resilience and Plasticity.HASE82005Conference and Workshop Papersclosedconf/hase/Servida0510.1109/HASE.2005.22https://doi.org/10.1109/HASE.2005.22https://dblp.org/rec/conf/hase/Servida05URL#5896345Pasquale di TommasoFrancesco FlamminiArmando LazzaroRaffaele PellecchiaAngela SansevieroThe Simulation of Anomalies in the Functional Testing of the ERTMS/ETCS Trackside System.HASE131-1392005Conference and Workshop Papersclosedconf/hase/TommasoFLPS0510.1109/HASE.2005.24https://doi.org/10.1109/HASE.2005.24https://dblp.org/rec/conf/hase/TommasoFLPS05URL#5896346Chris WalterPeter EllisBrian LaValleyThe Reliable Platform Service: A Property-Based Fault Tolerant Service Architecture.HASE34-432005Conference and Workshop Papersclosedconf/hase/WalterEL0510.1109/HASE.2005.23https://doi.org/10.1109/HASE.2005.23https://dblp.org/rec/conf/hase/WalterEL05URL#5896347Message from the General Chair.HASE2005Conference and Workshop Papersclosedconf/hase/X0510.1109/HASE.2005.11https://doi.org/10.1109/HASE.2005.11https://dblp.org/rec/conf/hase/X05URL#5896348Message from the Program Chair.HASE2005Conference and Workshop Papersclosedconf/hase/X05a10.1109/HASE.2005.12https://doi.org/10.1109/HASE.2005.12https://dblp.org/rec/conf/hase/X05aURL#5896349Organization.HASE2005Conference and Workshop Papersclosedconf/hase/X05b10.1109/HASE.2005.17https://doi.org/10.1109/HASE.2005.17https://dblp.org/rec/conf/hase/X05bURL#5896350List of Reviewers.HASE2005Conference and Workshop Papersclosedconf/hase/X05c10.1109/HASE.2005.10https://doi.org/10.1109/HASE.2005.10https://dblp.org/rec/conf/hase/X05cURL#5896351Ninth IEEE International Symposium on High Assurance Systems Engineering (HASE 2005), 12-14 October 2005, Heidelberg, GermanyHASEIEEE Computer Society2005Editorshipconf/hase/2005https://ieeexplore.ieee.org/xpl/conhome/10554/proceedinghttps://dblp.org/rec/conf/hase/2005URL#5957284Anneliese Amschler AndrewsAndrew O'FallonTom Chen 0001RUBASTEM: A Method for Testing VHDL Behavioral Models.HASE187-1962004Conference and Workshop Papersclosedconf/hase/AndrewsOC0410.1109/HASE.2004.1281743https://doi.org/10.1109/HASE.2004.1281743https://dblp.org/rec/conf/hase/AndrewsOC04URL#6039476Mansour H. AssafSunil R. DasEmil M. PetriuMehmet SahinogluEnhancing Testability in Architectural Design for the New Generation of Core-Based Embedded Systems.HASE312-3132004Conference and Workshop Papersclosedconf/hase/AssafDPS0410.1109/HASE.2004.1281775https://doi.org/10.1109/HASE.2004.1281775https://dblp.org/rec/conf/hase/AssafDPS04URL#6039477Thomas BarrArchitectural Overview of the Computational Intelligence Testing Tool: CI-Tool.HASE269-2702004Conference and Workshop Papersclosedconf/hase/Barr0410.1109/HASE.2004.1281754https://doi.org/10.1109/HASE.2004.1281754https://dblp.org/rec/conf/hase/Barr04URL#6039478Iain BateNeil C. AudsleyFlexible Design of Complex High-Integrity Systems Using Trade Offs.HASE22-312004Conference and Workshop Papersclosedconf/hase/BateA0410.1109/HASE.2004.1281727https://doi.org/10.1109/HASE.2004.1281727https://dblp.org/rec/conf/hase/BateA04URL#6039479Donald J. BerndtAlison WatkinsInvestigating the Performance of Genetic Algorithm-Based Software Test Case Generation.HASE261-2622004Conference and Workshop Papersclosedconf/hase/BerndtW0410.1109/HASE.2004.1281750https://doi.org/10.1109/HASE.2004.1281750https://dblp.org/rec/conf/hase/BerndtW04URL#6039480Chia-Chu ChiangA Formal Specification-Based Approach to Distributed Parallel Programming.HASE197-2052004Conference and Workshop Papersclosedconf/hase/Chiang0410.1109/HASE.2004.1281744https://doi.org/10.1109/HASE.2004.1281744https://dblp.org/rec/conf/hase/Chiang04URL#6039481Lazar CrawfordJared ErwinSteafano GrimaldiSoma MitraAndrew J. KorneckiDavid P. GluchA Study of Automatic Code Generation for Safety-Critical Software: Preliminary Report.HASE287-2882004Conference and Workshop Papersclosedconf/hase/CrawfordEGMKG0410.1109/HASE.2004.1281765https://doi.org/10.1109/HASE.2004.1281765https://dblp.org/rec/conf/hase/CrawfordEGMKG04URL#6039482Josh DehlingerRobyn R. LutzSoftware Fault Tree Analysis for Product Lines.HASE12-212004Conference and Workshop Papersclosedconf/hase/DehlingerL0410.1109/HASE.2004.1281726https://doi.org/10.1109/HASE.2004.1281726https://dblp.org/rec/conf/hase/DehlingerL04URL#6039483Ewen DenneyBernd Fischer 0002Johann SchumannAdding Assurance to Automatically Generated Code.HASE297-2992004Conference and Workshop Papersclosedconf/hase/DenneyFS0410.1109/HASE.2004.1281768https://doi.org/10.1109/HASE.2004.1281768https://dblp.org/rec/conf/hase/DenneyFS04URL#6039484Dejan DesovskiCombining Testing and Model Checking for Verification of High Assurance Systems.HASE279-2802004Conference and Workshop Papersclosedconf/hase/Desovski0410.1109/HASE.2004.1281758https://doi.org/10.1109/HASE.2004.1281758https://dblp.org/rec/conf/hase/Desovski04URL#6039485Jing Dong 0005Sheng Yang 0002Towards Trusted Composition in Software Design.HASE306-3072004Conference and Workshop Papersclosedconf/hase/DongY0410.1109/HASE.2004.1281772https://doi.org/10.1109/HASE.2004.1281772https://dblp.org/rec/conf/hase/DongY04URL#6039486Katerina Goseva-PopstojanovaSunil KamavaramSoftware Reliability Estimation under Uncertainty: Generalization of the Method of Moments.HASE209-2182004Conference and Workshop Papersclosedconf/hase/Goseva-PopstojanovaK0410.1109/HASE.2004.1281745https://doi.org/10.1109/HASE.2004.1281745https://dblp.org/rec/conf/hase/Goseva-PopstojanovaK04URL#6039487Stefan GossensMario Dal CinStructural Analysis of Explicit Fault-Tolerant Programs.HASE89-962004Conference and Workshop Papersclosedconf/hase/GossensC0410.1109/HASE.2004.1281733https://doi.org/10.1109/HASE.2004.1281733https://dblp.org/rec/conf/hase/GossensC04URL#6039488Zonghua Gu 0001Shige WangSharath KodaseKang G. ShinMulti-View Modeling and Analysis of Embedded Real-Time Software with Meta-Modeling and Model Transformation.HASE32-412004Conference and Workshop Papersclosedconf/hase/GuWKS0410.1109/HASE.2004.1281728https://doi.org/10.1109/HASE.2004.1281728https://dblp.org/rec/conf/hase/GuWKS04URL#6039489Pramod GuptaJohann SchumannA Tool for Verification and Validation of Neural Network Based Adaptive Controllers for High Assurance Systems.HASE277-2782004Conference and Workshop Papersclosedconf/hase/GuptaS0410.1109/HASE.2004.1281757https://doi.org/10.1109/HASE.2004.1281757https://dblp.org/rec/conf/hase/GuptaS04URL#6039490Mats Per Erik HeimdahlGeorge DevarajRobert WeberSpecification Test Coverage Adequacy Criteria = Specification Test Generation Inadequacy Criteria?HASE178-1862004Conference and Workshop Papersclosedconf/hase/HeimdahlGW0410.1109/HASE.2004.1281742https://doi.org/10.1109/HASE.2004.1281742https://dblp.org/rec/conf/hase/HeimdahlGW04URL#6039491Praveen IkkurthyJohn ShahbazianMiguel A. LabradorKenneth J. ChristensenTesting Large Scale Streaming Internet Applications over Wireless LANs.HASE109-1152004Conference and Workshop Papersclosedconf/hase/IkkurthySLC0410.1109/HASE.2004.1281735https://doi.org/10.1109/HASE.2004.1281735https://dblp.org/rec/conf/hase/IkkurthySLC04URL#6039492Arshad JhumkaMartin HillerNeeraj SuriAn Approach for Designing and Assessing Detectors for Dependable Component-Based Systems.HASE69-782004Conference and Workshop Papersclosedconf/hase/JhumkaHS0410.1109/HASE.2004.1281731https://doi.org/10.1109/HASE.2004.1281731https://dblp.org/rec/conf/hase/JhumkaHS04URL#6039493Jan JürjensDeveloping High-Assurance Secure Systems with UML: A Smartcard-Based Purchase Protocol.HASE231-2402004Conference and Workshop Papersclosedconf/hase/Jurjens0410.1109/HASE.2004.1281747https://doi.org/10.1109/HASE.2004.1281747https://dblp.org/rec/conf/hase/Jurjens04URL#6039494Tom KeeleyKEEL Technology Applied to Highly Distributed Loosely Coupled Systems.HASE300-3012004Conference and Workshop Papersclosedconf/hase/Keeley0410.1109/HASE.2004.1281769https://doi.org/10.1109/HASE.2004.1281769https://dblp.org/rec/conf/hase/Keeley04URL#6039495Taghi M. KhoshgoftaarMohamed E. AbushadiResource-Sensitive Intrusion Detection Models for Network Traffic.HASE249-2582004Conference and Workshop Papersclosedconf/hase/KhoshgoftaarA0410.1109/HASE.2004.1281749https://doi.org/10.1109/HASE.2004.1281749https://dblp.org/rec/conf/hase/KhoshgoftaarA04URL#6039496Seo Ryong KooPoong-Hyun SeongSung Deok ChaSoftware Design Specification and Analysis Technique for the Safety Critical Software Based on Programmable Logic Controller (PLC).HASE283-2842004Conference and Workshop Papersclosedconf/hase/KooSC0410.1109/HASE.2004.1281760https://doi.org/10.1109/HASE.2004.1281760https://dblp.org/rec/conf/hase/KooSC04URL#6039497Andrew J. KorneckiKimberley HallDarryl HearnHerman LauJanusz ZalewskiEvaluation of Software Development Tools for High Assurance Safety Critical Systems.HASE273-2742004Conference and Workshop Papersclosedconf/hase/KorneckiHHLZ0410.1109/HASE.2004.1281755https://doi.org/10.1109/HASE.2004.1281755https://dblp.org/rec/conf/hase/KorneckiHHLZ04URL#6039498Suraj C. KothariLuke BishopJeremias SaucedaGary DaughertyKnowledge-Centric and Language Independent Framework for Safety Analysis Tools.HASE45-552004Conference and Workshop Papersclosedconf/hase/KothariBSD0410.1109/HASE.2004.1281729https://doi.org/10.1109/HASE.2004.1281729https://dblp.org/rec/conf/hase/KothariBSD04URL#6039499Mark LastMenahem FriedmanAutomated Detection of Injected Faults in a Differential Equation Solver.HASE263-2642004Conference and Workshop Papersclosedconf/hase/LastF0410.1109/HASE.2004.1281751https://doi.org/10.1109/HASE.2004.1281751https://dblp.org/rec/conf/hase/LastF04URL#6039500Mark Sh. LevinMark LastMulti-Function System Testing: Composition of Test Sets.HASE99-1082004Conference and Workshop Papersclosedconf/hase/LevinL0410.1109/HASE.2004.1281734https://doi.org/10.1109/HASE.2004.1281734https://dblp.org/rec/conf/hase/LevinL04URL#6039501Richard C. LingerAlan R. HevnerGwendolyn H. WaltonMark G. PleszkochAutomated Detection of Injected Faults in a Differential Equation Solver Network Systems Development.HASE265-2662004Conference and Workshop Papersclosedconf/hase/LingerHWP0410.1109/HASE.2004.1281752https://doi.org/10.1109/HASE.2004.1281752https://dblp.org/rec/conf/hase/LingerHWP04URL#6039502Richard C. LingerMark G. PleszkochFunction Extraction (FX) Technology: Automated Calculation of Program Behavior for High-Assurance Systems.HASE267-2682004Conference and Workshop Papersclosedconf/hase/LingerP0410.1109/HASE.2004.1281753https://doi.org/10.1109/HASE.2004.1281753https://dblp.org/rec/conf/hase/LingerP04URL#6039503Yi Liu 0023Taghi M. KhoshgoftaarReducing Overfitting in Genetic Programming Models for Software Quality Classification.HASE56-652004Conference and Workshop Papersclosedconf/hase/LiuK0410.1109/HASE.2004.1281730https://doi.org/10.1109/HASE.2004.1281730https://dblp.org/rec/conf/hase/LiuK04URL#6039504Xiaodong LuYi ZhouMisato TasakaIvan LuqueKinji MoriRyuji TakanukiAutonomous Rating Oriented Agent Allocation to Achieve High Response in Demand-Oriented Information Service System.HASE275-2762004Conference and Workshop Papersclosedconf/hase/LuZTLMT0410.1109/HASE.2004.1281756https://doi.org/10.1109/HASE.2004.1281756https://dblp.org/rec/conf/hase/LuZTLMT04URL#6039505Ivan LuqueXiaodong LuMisato TasakaKinji MoriYasushi KubaDecentralized Workload Management for Assurance According to Heterogeneous Service Levels.HASE79-882004Conference and Workshop Papersclosedconf/hase/LuqueLTMK0410.1109/HASE.2004.1281732https://doi.org/10.1109/HASE.2004.1281732https://dblp.org/rec/conf/hase/LuqueLTMK04URL#6039506Qingkai MaWei Hao 0001I-Ling YenFarokh B. BastaniMultiparty Computation with Full Computation Power and Reduced Overhead.HASE241-2482004Conference and Workshop Papersclosedconf/hase/MaHYB0410.1109/HASE.2004.1281748https://doi.org/10.1109/HASE.2004.1281748https://dblp.org/rec/conf/hase/MaHYB04URL#6039507Tetsuya MasuishiKinji MoriA Method for Solving Trade-Off among Cost for Owned/Borrowed Resource and Loss of Business Chances.HASE156-1642004Conference and Workshop Papersclosedconf/hase/MasuishiM0410.1109/HASE.2004.1281740https://doi.org/10.1109/HASE.2004.1281740https://dblp.org/rec/conf/hase/MasuishiM04URL#6039508Tim MenziesJustin S. Di StefanoHow Good Is Your Blind Spot Sampling Policy?HASE129-1382004Conference and Workshop Papersclosedconf/hase/MenziesS0410.1109/HASE.2004.1281737https://doi.org/10.1109/HASE.2004.1281737https://dblp.org/rec/conf/hase/MenziesS04URL#6039509Hideki NomotoState Oriented Programming.HASE304-3052004Conference and Workshop Papersclosedconf/hase/Nomoto0410.1109/HASE.2004.1281771https://doi.org/10.1109/HASE.2004.1281771https://dblp.org/rec/conf/hase/Nomoto04URL#6039510Hiroyuki OkamuraAtsushi MurayamaTadashi DohiEM Algorithm for Discrete Software Reliability Models: A Unified Parameter Estimation Method.HASE219-2282004Conference and Workshop Papersclosedconf/hase/OkamuraMD0410.1109/HASE.2004.1281746https://doi.org/10.1109/HASE.2004.1281746https://dblp.org/rec/conf/hase/OkamuraMD04URL#6039511Yiannis PapadopoulosDavid Parker 0002Christian GranteAutomating the Failure Modes and Effects Analysis of Safety Critical Systems.HASE310-3112004Conference and Workshop Papersclosedconf/hase/PapadopoulosPG0410.1109/HASE.2004.1281774https://doi.org/10.1109/HASE.2004.1281774https://dblp.org/rec/conf/hase/PapadopoulosPG04URL#6039512Laura PullumMarjorie DarrahSpiro T. SkiasKam S. TsoAnn T. TaiDeveloping a Data Driven Prognostic System with Limited System Information.HASE281-2822004Conference and Workshop Papersclosedconf/hase/PullumDSTT0410.1109/HASE.2004.1281759https://doi.org/10.1109/HASE.2004.1281759https://dblp.org/rec/conf/hase/PullumDSTT04URL#6039513Norman F. SchneidewindAssessing Reliability Risk Using Fault Correction Profiles.HASE139-1482004Conference and Workshop Papersclosedconf/hase/Schneidewind0410.1109/HASE.2004.1281738https://doi.org/10.1109/HASE.2004.1281738https://dblp.org/rec/conf/hase/Schneidewind04URL#6039514Frederick T. SheldonThomas E. PotokAndy LoeblAxel W. KringsPaul W. OmanManaging Secure Survivable Critical Infrastructures to Avoid Vulnerabilities.HASE293-2962004Conference and Workshop Papersclosedconf/hase/SheldonPLKO0410.1109/HASE.2004.1281767https://doi.org/10.1109/HASE.2004.1281767https://dblp.org/rec/conf/hase/SheldonPLKO04URL#6039515Myung Jun SongSeo Ryong KooPoong-Hyun SeongDevelopment of a Verification Method for Timed Function Blocks Using ESDT and SMV.HASE285-2862004Conference and Workshop Papersclosedconf/hase/SongKS0410.1109/HASE.2004.1281764https://doi.org/10.1109/HASE.2004.1281764https://dblp.org/rec/conf/hase/SongKS04URL#6039516Dongfeng WangHui Ma 0006Farokh B. BastaniI-Ling YenDecomposition of Fairness and Performance Aspects for High-Assurance Continuous Process-Control Systems.HASE3-112004Conference and Workshop Papersclosedconf/hase/WangMBY0410.1109/HASE.2004.1281725https://doi.org/10.1109/HASE.2004.1281725https://dblp.org/rec/conf/hase/WangMBY04URL#6039517Rosina WeberDuanqing WuKnowledge Management for Computational Intelligence Systems.HASE116-1252004Conference and Workshop Papersclosedconf/hase/WeberW0410.1109/HASE.2004.1281736https://doi.org/10.1109/HASE.2004.1281736https://dblp.org/rec/conf/hase/WeberW04URL#6039518Gregory L. WickstromJared DavisSteven E. MorrisonSteve RoachVictor L. WinterThe SSP: An Example of High-Assurance Systems Engineering.HASE167-1772004Conference and Workshop Papersclosedconf/hase/WickstromDMRW0410.1109/HASE.2004.1281741https://doi.org/10.1109/HASE.2004.1281741https://dblp.org/rec/conf/hase/WickstromDMRW04URL#6039519Wei Yu 0002Analyze the Worm-Based Attack in Large Scale P2P.HASE308-3092004Conference and Workshop Papersclosedconf/hase/Yu0410.1109/HASE.2004.1281773https://doi.org/10.1109/HASE.2004.1281773https://dblp.org/rec/conf/hase/Yu04URL#6039520Huiqun YuXudong HeYi Deng 0001Lian MoA Formal Approach to Designing Secure Software Architectures.HASE289-2902004Conference and Workshop Papersclosedconf/hase/YuHDM0410.1109/HASE.2004.1281766https://doi.org/10.1109/HASE.2004.1281766https://dblp.org/rec/conf/hase/YuHDM04URL#6039521Shi ZhongTaghi M. KhoshgoftaarNaeem SeliyaUnsupervised Learning for Expert-Based Software Quality Estimation.HASE149-1552004Conference and Workshop Papersclosedconf/hase/ZhongKS0410.1109/HASE.2004.1281739https://doi.org/10.1109/HASE.2004.1281739https://dblp.org/rec/conf/hase/ZhongKS04URL#6039522Jia ZhouKendra M. L. CooperI-Ling YenA Rule-Based Component Customization Technique for QoS Properties.HASE302-3032004Conference and Workshop Papersclosedconf/hase/ZhouCY0410.1109/HASE.2004.1281770https://doi.org/10.1109/HASE.2004.1281770https://dblp.org/rec/conf/hase/ZhouCY04URL#60395238th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2004), 25-26 March 2004, Tampa, FL, USAHASEIEEE Computer Society2004Editorshipconf/hase/2004https://ieeexplore.ieee.org/xpl/conhome/9019/proceedinghttps://dblp.org/rec/conf/hase/2004URL#6095325Hafiz Farooq AhmadMulti-Agent Systems: Overview of a New Paradigm for Distributed Systems.HASE101-1082002Conference and Workshop Papersclosedconf/hase/Ahmad0210.1109/HASE.2002.1173110https://doi.org/10.1109/HASE.2002.1173110https://dblp.org/rec/conf/hase/Ahmad02URL#6273591Masayuki AraiHitoshi KurosuMamoru OharaRyo SuzukiSatoshi FukumotoKazuhiko IwasakiExperiment for High-Assurance Video Conference System over the Internet.HASE137-1422002Conference and Workshop Papersclosedconf/hase/AraiKOSFI0210.1109/HASE.2002.1173114https://doi.org/10.1109/HASE.2002.1173114https://dblp.org/rec/conf/hase/AraiKOSFI02URL#6273592Kai-Yuan CaiTsong Yueh ChenT. H. TseTowards Research on Software Cybernetics.HASE240-2422002Conference and Workshop Papersclosedconf/hase/CaiCT0210.1109/HASE.2002.1173129https://doi.org/10.1109/HASE.2002.1173129https://dblp.org/rec/conf/hase/CaiCT02URL#6273593Tsong Yueh ChenPak-Lok PoonSau-Fun TangT. H. TseYuen-Tak YuTowards a Problem-Driven Approach to Perspective-Based Reading.HASE221-2292002Conference and Workshop Papersclosedconf/hase/ChenPTTY0210.1109/HASE.2002.1173126https://doi.org/10.1109/HASE.2002.1173126https://dblp.org/rec/conf/hase/ChenPTTY02URL#6273594Yunja ChoiMats Per Erik HeimdahlModel Checking RSML-e Requirements.HASE109-1182002Conference and Workshop Papersclosedconf/hase/ChoiH0210.1109/HASE.2002.1173111https://doi.org/10.1109/HASE.2002.1173111https://dblp.org/rec/conf/hase/ChoiH02URL#6273595Tadashi DohiKazuki IwamotoHiroyuki OkamuraNaoto KaioDiscrete Availability Models to Rejuvenate a Telecommunication Billing Application.HASE159-1662002Conference and Workshop Papersclosedconf/hase/DohiIOK0210.1109/HASE.2002.1173117https://doi.org/10.1109/HASE.2002.1173117https://dblp.org/rec/conf/hase/DohiIOK02URL#6273596Gang XuZhiming WuA Kind of Deadlock-free Scheduling Method Based on Petri Net.HASE195-2002002Conference and Workshop Papersclosedconf/hase/GangW0210.1109/HASE.2002.1173123https://doi.org/10.1109/HASE.2002.1173123https://dblp.org/rec/conf/hase/GangW02URL#6273597Stefan GossensEnhancing System Validation with Behavioural Types.HASE201-2102002Conference and Workshop Papersclosedconf/hase/Gossens0210.1109/HASE.2002.1173124https://doi.org/10.1109/HASE.2002.1173124https://dblp.org/rec/conf/hase/Gossens02URL#6273598Werner Haas 0003Stefan GossensUlrich HeinkelIntegration of Formal Specification into the Standard ASIC Design Flow.HASE189-1942002Conference and Workshop Papersclosedconf/hase/HaasGH0210.1109/HASE.2002.1173122https://doi.org/10.1109/HASE.2002.1173122https://dblp.org/rec/conf/hase/HaasGH02URL#6273599Tamir HegazyBinoy RavindranOn Decentralized Proactive Resource Allocation in Asynchronous Real-Time Distributed Systems.HASE27-362002Conference and Workshop Papersclosedconf/hase/HegazyR0210.1109/HASE.2002.1173097https://doi.org/10.1109/HASE.2002.1173097https://dblp.org/rec/conf/hase/HegazyR02URL#6273600Arshad JhumkaMartin HillerNeeraj SuriAn Approach to Specify and Test Component-Based Dependable Software.HASE211-2202002Conference and Workshop Papersclosedconf/hase/JhumkaHS0210.1109/HASE.2002.1173125https://doi.org/10.1109/HASE.2002.1173125https://dblp.org/rec/conf/hase/JhumkaHS02URL#6273601Kazuo KeraKeisuke BekkiKinji MoriIssei MasumotoHigh Assurance Step-by-Step Autonomous Construction Technique for Large Real Time System.HASE79-862002Conference and Workshop Papersclosedconf/hase/KeraBMM0210.1109/HASE.2002.1173106https://doi.org/10.1109/HASE.2002.1173106https://dblp.org/rec/conf/hase/KeraBMM02URL#6273602Taghi M. KhoshgoftaarErik GeleynLaurent A. NguyenLofton A. BullardCost-Sensitive Boosting In Software Quality Modeling.HASE51-622002Conference and Workshop Papersclosedconf/hase/KhoshgoftaarGNB0210.1109/HASE.2002.1173102https://doi.org/10.1109/HASE.2002.1173102https://dblp.org/rec/conf/hase/KhoshgoftaarGNB02URL#6273603K. H. KimToward QoS Certification of Real-Time Distributed Computing Systems.HASE177-1882002Conference and Workshop Papersclosedconf/hase/Kim0210.1109/HASE.2002.1173121https://doi.org/10.1109/HASE.2002.1173121https://dblp.org/rec/conf/hase/Kim02URL#6273604Carlos Pérez LeguízamoAqeel A. SyedKinji MoriAssurance System Architecture for Distributed Database Systems.HASE43-502002Conference and Workshop Papersclosedconf/hase/LeguizamoSM0210.1109/HASE.2002.1173101https://doi.org/10.1109/HASE.2002.1173101https://dblp.org/rec/conf/hase/LeguizamoSM02URL#6273605Peng Li 0020Binoy RavindranEfficiently Tolerating Failures in Asynchronous Real-Time Distributed Systems.HASE19-262002Conference and Workshop Papersclosedconf/hase/LiR0210.1109/HASE.2002.1173096https://doi.org/10.1109/HASE.2002.1173096https://dblp.org/rec/conf/hase/LiR02URL#6273606Masayuki MatsumotoTadao TsurumakiSatoru KitamuraDai WatanabeKinji MoriAssurance Evaluation Technology of Train Control System for Achieving Expansion during Operation .HASE71-782002Conference and Workshop Papersclosedconf/hase/MatsumotoTKWM0210.1109/HASE.2002.1173105https://doi.org/10.1109/HASE.2002.1173105https://dblp.org/rec/conf/hase/MatsumotoTKWM02URL#6273607Toshiaki MiyazakiKatsushi IwashitaTowards Adaptive Networking.HASE151-1582002Conference and Workshop Papersclosedconf/hase/MiyazakiI0210.1109/HASE.2002.1173116https://doi.org/10.1109/HASE.2002.1173116https://dblp.org/rec/conf/hase/MiyazakiI02URL#6273608Seigo NumajiriAkira MiuraKeiko YoshiharaRyutaro MatsumuraEvaluation of the Performance of the Large Scale Network: Performance Evaluation of the PDC-P Network Providing the i-mode Service.HASE129-1362002Conference and Workshop Papersclosedconf/hase/NumajiriMYM0210.1109/HASE.2002.1173113https://doi.org/10.1109/HASE.2002.1173113https://dblp.org/rec/conf/hase/NumajiriMYM02URL#6273609Kazuhito OhmakiOpen Source Software Research Activities in AIST towards Secure Open Systems.HASE37-422002Conference and Workshop Papersclosedconf/hase/Ohmaki0210.1109/HASE.2002.1173098https://doi.org/10.1109/HASE.2002.1173098https://dblp.org/rec/conf/hase/Ohmaki02URL#6273610Tomoyuki OhtaMunehiko FujimotoShinji InoueYoshiaki KakudaHi-TORA: A Hierarchical Routing Protocol in Ad Hoc Networks.HASE143-1502002Conference and Workshop Papersclosedconf/hase/OhtaFIK0210.1109/HASE.2002.1173115https://doi.org/10.1109/HASE.2002.1173115https://dblp.org/rec/conf/hase/OhtaFIK02URL#6273611David Owen 0002Bojan CukicTim MenziesAn Alternative to Model Checking: Verification by Random Search of AND-OR Graphs Representing Finite-State Models.HASE119-1282002Conference and Workshop Papersclosedconf/hase/OwenCM0210.1109/HASE.2002.1173112https://doi.org/10.1109/HASE.2002.1173112https://dblp.org/rec/conf/hase/OwenCM02URL#6273612Binoy RavindranGérard Le LannPeng Li 0020Constructing High Assurance Asynchronous Real-Time Distributed Systems: A Proof-Based System Engineering Approach.HASE89-922002Conference and Workshop Papersclosedconf/hase/RavindranLL0210.1109/HASE.2002.1173108https://doi.org/10.1109/HASE.2002.1173108https://dblp.org/rec/conf/hase/RavindranLL02URL#6273613Sahra Sedigh-AliArif GhafoorRaymond A. PaulMetrics-Based Framework for Decision Making in COTS-Based Software Systems.HASE243-2442002Conference and Workshop Papersclosedconf/hase/Sedigh-AliGP0210.1109/HASE.2002.1173130https://doi.org/10.1109/HASE.2002.1173130https://dblp.org/rec/conf/hase/Sedigh-AliGP02URL#6273614Yasutomo ShirakawaJR East Contactless IC Card Automatic Fare Collection System "Suica".HASE3-122002Conference and Workshop Papersclosedconf/hase/Shirakawa0210.1109/HASE.2002.1173094https://doi.org/10.1109/HASE.2002.1173094https://dblp.org/rec/conf/hase/Shirakawa02URL#6273615Hiroki SuguriEiichiro KodamaMasatoshi MiyazakiIsao KajiAssuring Interoperability between Heterogeneous Multi-Agent Systems with a Gateway Agent.HASE167-1702002Conference and Workshop Papersclosedconf/hase/SuguriKMK0210.1109/HASE.2002.1173118https://doi.org/10.1109/HASE.2002.1173118https://dblp.org/rec/conf/hase/SuguriKMK02URL#6273616Nejmeddine TagougObject-Oriented System Decomposition Quality.HASE230-2362002Conference and Workshop Papersclosedconf/hase/Tagoug0210.1109/HASE.2002.1173127https://doi.org/10.1109/HASE.2002.1173127https://dblp.org/rec/conf/hase/Tagoug02URL#6273617Juichi TakahashiYoshiaki KakudaExtended-Model Based Testing by Directed Chinese Postman Algorithm.HASE237-2392002Conference and Workshop Papersclosedconf/hase/TakahashiK0210.1109/HASE.2002.1173128https://doi.org/10.1109/HASE.2002.1173128https://dblp.org/rec/conf/hase/TakahashiK02URL#6273618Yongdong TanLijun Yin 0001Qingquan QianKinji MoriA Biologically Inspired Assurance Definition and Specification in Heterogeneous Autonomous Decentralized Systems.HASE63-702002Conference and Workshop Papersclosedconf/hase/TanYQM0210.1109/HASE.2002.1173103https://doi.org/10.1109/HASE.2002.1173103https://dblp.org/rec/conf/hase/TanYQM02URL#6273619Wei-Tek TsaiRaymond A. PaulWeiwei SongZhibin CaoCoyote: An XML-Based Framework for Web Services Testing.HASE173-1762002Conference and Workshop Papersclosedconf/hase/TsaiPSC0210.1109/HASE.2002.1173120https://doi.org/10.1109/HASE.2002.1173120https://dblp.org/rec/conf/hase/TsaiPSC02URL#6273620Wei-Tek TsaiRaymond A. PaulYamin WangChun FanDong WangExtending WSDL to Facilitate Web Services Testing.HASE171-1722002Conference and Workshop Papersclosedconf/hase/TsaiPWFW0210.1109/HASE.2002.1173119https://doi.org/10.1109/HASE.2002.1173119https://dblp.org/rec/conf/hase/TsaiPWFW02URL#6273621Shuichiro YamanouchiHigh Assurance, My Personal Experience and View Point.HASE93-1002002Conference and Workshop Papersclosedconf/hase/Yamanouchi0210.1109/HASE.2002.1173109https://doi.org/10.1109/HASE.2002.1173109https://dblp.org/rec/conf/hase/Yamanouchi02URL#6273622Hiroyuki YashiroYoshirou TakahashiTeruo FujiwaraA High Assurance Timing Synchronization Technology for Space On-Board Distributed Computer Systems.HASE87-882002Conference and Workshop Papersclosedconf/hase/YashiroTF0210.1109/HASE.2002.1173107https://doi.org/10.1109/HASE.2002.1173107https://dblp.org/rec/conf/hase/YashiroTF02URL#6273623Katsuyuki YasudaShigeru YamadaThe Concept and Practice of Software Quality Assurance in Japan in the Global Era.HASE13-182002Conference and Workshop Papersclosedconf/hase/YasudaY0210.1109/HASE.2002.1173095https://doi.org/10.1109/HASE.2002.1173095https://dblp.org/rec/conf/hase/YasudaY02URL#62736247th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2002), 23-25 October 2002, Tokyo, JapanHASEIEEE Computer Society2002Editorshipconf/hase/2002https://ieeexplore.ieee.org/xpl/conhome/8375/proceedinghttps://dblp.org/rec/conf/hase/2002URL#6310992Farokh B. BastaniI-Ling YenSung KimHighly Reliable Relational Control Programs for Robust Rapid Transit Systems.HASE65-742001Conference and Workshop Papersclosedconf/hase/BastaniYK0110.1109/HASE.2001.966808https://doi.org/10.1109/HASE.2001.966808https://dblp.org/rec/conf/hase/BastaniYK01URL#6366069Kerstin BuchackerVolkmar SiehFramework for Testing the Fault-Tolerance of Systems Including OS and Network Aspects.HASE95-1052001Conference and Workshop Papersclosedconf/hase/BuchackerS0110.1109/HASE.2001.966811https://doi.org/10.1109/HASE.2001.966811https://dblp.org/rec/conf/hase/BuchackerS01URL#6366070Giovanni DipoppaGiovanni D'AlessandroRoberto SempriniEnrico TronciIntegrating Automatic Verification of Safety Requirements in Railway Interlocking System Design.HASE209-2192001Conference and Workshop Papersclosedconf/hase/DipoppaDST0110.1109/HASE.2001.966821https://doi.org/10.1109/HASE.2001.966821https://dblp.org/rec/conf/hase/DipoppaDST01URL#6366071Martin S. FeatherStephen FickasN.-A. Razermera-MamyModel-Checking for Validation of a Fault Protection System.HASE32-412001Conference and Workshop Papersclosedconf/hase/FeatherFR0110.1109/HASE.2001.966805https://doi.org/10.1109/HASE.2001.966805https://dblp.org/rec/conf/hase/FeatherFR01URL#6366072Gisele Rodrigues Mesquita FerreiraCecília M. F. RubiraRogério de LemosExplicit Representation of Exception Handling in the Development of Dependable Component-Based Systems.HASE182-1932001Conference and Workshop Papersclosedconf/hase/FerreiraRL0110.1109/HASE.2001.966819https://doi.org/10.1109/HASE.2001.966819https://dblp.org/rec/conf/hase/FerreiraRL01URL#6366073M. S. FisherBojan CukicAutomating Techniques for Inspecting High Assurance Systems.HASE117-1262001Conference and Workshop Papersclosedconf/hase/FisherC0110.1109/HASE.2001.966813https://doi.org/10.1109/HASE.2001.966813https://dblp.org/rec/conf/hase/FisherC01URL#6366074Sudipto GhoshNishant BawaGerald CraigKetaki KalgaonkarA Test Management and Software Visualization Framework for Heterogeneous Distributed Applications.HASE106-1162001Conference and Workshop Papersclosedconf/hase/GhoshBCK0110.1109/HASE.2001.966812https://doi.org/10.1109/HASE.2001.966812https://dblp.org/rec/conf/hase/GhoshBCK01URL#6366075Steve GoddardRoger M. KieckhaferY. ZhangAn Unavailability Analysis of Firewall Sandwich Configurations.HASE139-1482001Conference and Workshop Papersclosedconf/hase/GoddardKZ0110.1109/HASE.2001.966815https://doi.org/10.1109/HASE.2001.966815https://dblp.org/rec/conf/hase/GoddardKZ01URL#6366076Steve GoddardTrevor SchroederThe SASHA Architecture for Network-Clustered Web Servers.HASE163-1722001Conference and Workshop Papersclosedconf/hase/GoddardS0110.1109/HASE.2001.966817https://doi.org/10.1109/HASE.2001.966817https://dblp.org/rec/conf/hase/GoddardS01URL#6366077Adriaan de GrootJozef HoomanFabrice KordonEmmanuel Paviot-AdetIsabelle Vernier-MounierMichel LemoineGervais GaudiéreVictor L. WinterDeepak KapurA Survey: Applying Formal Methods to a Software Intensive System.HASE55-642001Conference and Workshop Papersclosedconf/hase/GrootHKPVLGWK0110.1109/HASE.2001.966807https://doi.org/10.1109/HASE.2001.966807https://dblp.org/rec/conf/hase/GrootHKPVLGWK01URL#6366078Kazuo KeraKeisuke BekkiKeiji KamijyoKinji MoriAdaptive Step-by-Step Construction Technique Achieving High Assurance for Tokyo Metropolitan Railway Network.HASE228-2001Conference and Workshop Papersclosedconf/hase/KeraBKM0110.1109/HASE.2001.966823https://doi.org/10.1109/HASE.2001.966823https://dblp.org/rec/conf/hase/KeraBKM01URL#6366079John C. KnightErroneous Requirements: A Linguistic Basis for Their Occurrence and an Approach to Their Reduction.HASE32001Conference and Workshop Papersclosedconf/hase/Knight0110.1109/HASE.2001.10000https://doi.ieeecomputersociety.org/10.1109/HASE.2001.10000https://dblp.org/rec/conf/hase/Knight01URL#6366080Diego LatellaMieke MassinkA Formal Testing Framework for UML Statechart Diagrams Behaviours: From Theory to Automatic Verification.HASE11-222001Conference and Workshop Papersclosedconf/hase/LatellaM0110.1109/HASE.2001.966803https://doi.org/10.1109/HASE.2001.966803https://dblp.org/rec/conf/hase/LatellaM01URL#6366081Yi Liu 0023Taghi M. KhoshgoftaarGenetic Programming Model for Software Quality Classification.HASE127-1382001Conference and Workshop Papersclosedconf/hase/LiuK0110.1109/HASE.2001.966814https://doi.org/10.1109/HASE.2001.966814https://dblp.org/rec/conf/hase/LiuK01URL#6366082Masayuki MatsumotoSatoru KitamuraM. SatoHigh Assurance Technologies for Autonomous Decentralized Train Control System.HASE220-2272001Conference and Workshop Papersclosedconf/hase/MatsumotoKS0110.1109/HASE.2001.966822https://doi.org/10.1109/HASE.2001.966822https://dblp.org/rec/conf/hase/MatsumotoKS01URL#6366083Edgar NettMartin GergeleitMichael MockMechanisms for a Reliable Cooperation of Vehicles.HASE75-812001Conference and Workshop Papersclosedconf/hase/NettGM0110.1109/HASE.2001.966809https://doi.org/10.1109/HASE.2001.966809https://dblp.org/rec/conf/hase/NettGM01URL#6366084Allen P. NikoraRaphael R. SomeJeffrey M. VoasVictor L. WinterJie Xu 0007Software Dependability in Distributed and Mobile Computing Environments.HASE7-102001Conference and Workshop Papersclosedconf/hase/NikoraSVWX0110.1109/HASE.2001.10005https://doi.ieeecomputersociety.org/10.1109/HASE.2001.10005https://dblp.org/rec/conf/hase/NikoraSVWX01URL#6366085Michiel van OschScott A. SmolkaFinite-State Analysis of the CAN Bus Protocol.HASE42-542001Conference and Workshop Papersclosedconf/hase/OschS0110.1109/HASE.2001.966806https://doi.org/10.1109/HASE.2001.966806https://dblp.org/rec/conf/hase/OschS01URL#6366086Arnold W. PittlerKeynote Speaker.HASE42001Conference and Workshop Papersclosedconf/hase/Pittler0110.1109/HASE.2001.10003https://doi.ieeecomputersociety.org/10.1109/HASE.2001.10003https://dblp.org/rec/conf/hase/Pittler01URL#6366087Sanjai RayadurgamMats Per Erik HeimdahlTest-Sequence Generation from Formal Requirement Models.HASE23-312001Conference and Workshop Papersclosedconf/hase/RayadurgamH0110.1109/HASE.2001.966804https://doi.org/10.1109/HASE.2001.966804https://dblp.org/rec/conf/hase/RayadurgamH01URL#6366088Purnendu SinhaNeeraj SuriOn Simplifying Modular Specification and Verification of Distributed Protocols.HASE173-1812001Conference and Workshop Papersclosedconf/hase/SinhaS0110.1109/HASE.2001.966818https://doi.org/10.1109/HASE.2001.966818https://dblp.org/rec/conf/hase/SinhaS01URL#6366089David J. ThuenteJohn K. WhitemanSystems Engineering of Communication Protocols for Command and Control Systems.HASE194-2082001Conference and Workshop Papersclosedconf/hase/ThuenteW0110.1109/HASE.2001.966820https://doi.org/10.1109/HASE.2001.966820https://dblp.org/rec/conf/hase/ThuenteW01URL#6366090Jeffrey M. VoasWhy Testing under Expected Operational Scenarios is Not Sufficient.HASE5-102001Conference and Workshop Papersclosedconf/hase/Voas0110.1109/HASE.2001.10002https://doi.ieeecomputersociety.org/10.1109/HASE.2001.10002https://dblp.org/rec/conf/hase/Voas01URL#6366091Hiroyuki YashiroYoshirou TakahashiTeruo FujiwaraVerification of Assurance of Space On-Board Distributed Computer System.HASE82-942001Conference and Workshop Papersclosedconf/hase/YashiroTF0110.1109/HASE.2001.966810https://doi.org/10.1109/HASE.2001.966810https://dblp.org/rec/conf/hase/YashiroTF01URL#6366092Alec YasinsacJustin ChildsAnalyzing Internet Security Protocols.HASE149-1622001Conference and Workshop Papersclosedconf/hase/YasinsacC0110.1109/HASE.2001.966816https://doi.org/10.1109/HASE.2001.966816https://dblp.org/rec/conf/hase/YasinsacC01URL#63660936th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2001), Special Topic: Impact of Networking, 24-26 October 2001, Albuquerque, NM, USA, ProceedingsHASEIEEE Computer Society2001Editorshipconf/hase/2001https://ieeexplore.ieee.org/xpl/conhome/7642/proceedinghttps://dblp.org/rec/conf/hase/2001URL#6398034Bernhard K. AichernigAndreas GerstingerRobert AsterFormal specification techniques as a catalyst in validation.HASE203-2062000Conference and Workshop Papersclosedconf/hase/AichernigGA0010.1109/HASE.2000.895462https://doi.org/10.1109/HASE.2000.895462https://dblp.org/rec/conf/hase/AichernigGA00URL#6450650Brenton AtchisonPeter A. LindsaySafety validation of embedded control software using Z animation.HASE228-2372000Conference and Workshop Papersclosedconf/hase/AtchisonL0010.1109/HASE.2000.895467https://doi.org/10.1109/HASE.2000.895467https://dblp.org/rec/conf/hase/AtchisonL00URL#6450651Farokh B. BastaniSimeon C. NtafosI-Ling YenDoug E. HarrisRichard R. MorrowRaymond A. PaulA high-assurance measurement repository system.HASE265-2722000Conference and Workshop Papersclosedconf/hase/BastaniNYHMP0010.1109/HASE.2000.895471https://doi.org/10.1109/HASE.2000.895471https://dblp.org/rec/conf/hase/BastaniNYHMP00URL#6450652Iain BatePhilippa ConmyJohn A. McDermidGenerating evidence for certification of modern processors for use in safety-critical systems.HASE125-1342000Conference and Workshop Papersclosedconf/hase/BateCM0010.1109/HASE.2000.895450https://doi.org/10.1109/HASE.2000.895450https://dblp.org/rec/conf/hase/BateCM00URL#6450653Coskun BayrakMehmet SahinogluTimothy CummingsHigh assurance software testing in business and DoD.HASE207-2112000Conference and Workshop Papersclosedconf/hase/BayrakSC0010.1109/HASE.2000.895463https://doi.org/10.1109/HASE.2000.895463https://dblp.org/rec/conf/hase/BayrakSC00URL#6450654Monica BrockmeyerAutomatic abstractions of real-time specifications.HASE147-1582000Conference and Workshop Papersclosedconf/hase/Brockmeyer0010.1109/HASE.2000.895454https://doi.org/10.1109/HASE.2000.895454https://dblp.org/rec/conf/hase/Brockmeyer00URL#6450655Kerstin BuchackerModeling with extended fault trees.HASE238-2462000Conference and Workshop Papersclosedconf/hase/Buchacker0010.1109/HASE.2000.895468https://doi.org/10.1109/HASE.2000.895468https://dblp.org/rec/conf/hase/Buchacker00URL#6450656Michele CecconiEnrico TronciRequirements formalization and validation for a telecommunication equipment protection switcher.HASE169-1762000Conference and Workshop Papersclosedconf/hase/CecconiT0010.1109/HASE.2000.895456https://doi.org/10.1109/HASE.2000.895456https://dblp.org/rec/conf/hase/CecconiT00URL#6450657Sang-Yeong ChoiDuminda WijesekeraThe DADSim air defense simulation environment.HASE75-822000Conference and Workshop Papersclosedconf/hase/ChoiW0010.1109/HASE.2000.895444https://doi.org/10.1109/HASE.2000.895444https://dblp.org/rec/conf/hase/ChoiW00URL#6450658Mario Dal CinStructured language for specifications of quantitative requirements.HASE221-2272000Conference and Workshop Papersclosedconf/hase/Cin0010.1109/HASE.2000.895466https://doi.org/10.1109/HASE.2000.895466https://dblp.org/rec/conf/hase/Cin00URL#6450659Andrea CoccoliStefan SchemmerFelicita Di GiandomenicoMichael MockAndrea BondavalliAnalysis of group communication protocols to assess quality of service properties.HASE247-2562000Conference and Workshop Papersclosedconf/hase/CoccoliSGMB0010.1109/HASE.2000.895469https://doi.org/10.1109/HASE.2000.895469https://dblp.org/rec/conf/hase/CoccoliSGMB00URL#6450660Daniel E. CookeIssues concerning the future of computer science.HASE47-482000Conference and Workshop Papersclosedconf/hase/Cooke0010.1109/HASE.2000.895439https://doi.org/10.1109/HASE.2000.895439https://dblp.org/rec/conf/hase/Cooke00URL#6450661Bojan CukicDiwakar ChakravarthyBayesian framework for reliability assurance of a deployed safety critical system.HASE321-3292000Conference and Workshop Papersclosedconf/hase/CukicC0010.1109/HASE.2000.895477https://doi.org/10.1109/HASE.2000.895477https://dblp.org/rec/conf/hase/CukicC00URL#6450662Barbara J. CzernyJoseph G. D'AmbrosioBrian T. MurrayProviding convincing evidence of safety in X-by-wire automotive systems.HASE189-1922000Conference and Workshop Papersclosedconf/hase/CzernyDM0010.1109/HASE.2000.895458https://doi.org/10.1109/HASE.2000.895458https://dblp.org/rec/conf/hase/CzernyDM00URL#6450663Larry J. DaltonFirst principles applied to software safety - the novel use of silicon machinery.HASE216-2182000Conference and Workshop Papersclosedconf/hase/Dalton0010.1109/HASE.2000.895465https://doi.org/10.1109/HASE.2000.895465https://dblp.org/rec/conf/hase/Dalton00URL#6450664Tadashi DohiKaterina Goseva-PopstojanovaKishor S. TrivediAnalysis of software cost models with rejuvenation.HASE25-342000Conference and Workshop Papersclosedconf/hase/DohiGT0010.1109/HASE.2000.895436https://doi.org/10.1109/HASE.2000.895436https://dblp.org/rec/conf/hase/DohiGT00URL#6450665Gábor HuszerlIstván MajzikQuantitative analysis of dependability critical systems based on UML statechart models.HASE83-922000Conference and Workshop Papersclosedconf/hase/GaborI0010.1109/HASE.2000.895445https://doi.org/10.1109/HASE.2000.895445https://dblp.org/rec/conf/hase/GaborI00URL#6450666Alessandro F. Garcia 0001Delano M. BederCecília M. F. RubiraAn exception handling software architecture for developing fault-tolerant software.HASE311-3202000Conference and Workshop Papersclosedconf/hase/GarciaBR0010.1109/HASE.2000.895476https://doi.org/10.1109/HASE.2000.895476https://dblp.org/rec/conf/hase/GarciaBR00URL#6450667Ann Q. GatesHow can symposia be structured to benefit both industry and academia?HASE45-462000Conference and Workshop Papersclosedconf/hase/Gates0010.1109/HASE.2000.895438https://doi.org/10.1109/HASE.2000.895438https://dblp.org/rec/conf/hase/Gates00URL#6450668Tapan Kumar GhoshalS. BhattacharyaK. DattaThe experience of auditing software for safety critical railway signalling equipment.HASE193-1962000Conference and Workshop Papersclosedconf/hase/GhoshalBD0010.1109/HASE.2000.895459https://doi.org/10.1109/HASE.2000.895459https://dblp.org/rec/conf/hase/GhoshalBD00URL#6450669Stefania GnesiDiego LatellaMieke MassinkA stochastic extension of a behavioural subset of UML statechart diagrams.HASE55-642000Conference and Workshop Papersclosedconf/hase/GnesiLM0010.1109/HASE.2000.895442https://doi.org/10.1109/HASE.2000.895442https://dblp.org/rec/conf/hase/GnesiLM00URL#6450670Steve GoddardKevin JeffayThe synthesis of real-time systems from processing graphs.HASE177-1862000Conference and Workshop Papersclosedconf/hase/GoddardJ0010.1109/HASE.2000.895457https://doi.org/10.1109/HASE.2000.895457https://dblp.org/rec/conf/hase/GoddardJ00URL#6450671Gopal Gupta 0001Reliable software construction: a logic programming based methodology.HASE140-1412000Conference and Workshop Papersclosedconf/hase/Gupta0010.1109/HASE.2000.895452https://doi.org/10.1109/HASE.2000.895452https://dblp.org/rec/conf/hase/Gupta00URL#6450672Weiguo HeSteve GoddardCapturing an application's temporal properties with UML for Real-Time.HASE65-742000Conference and Workshop Papersclosedconf/hase/HeG0010.1109/HASE.2000.895443https://doi.org/10.1109/HASE.2000.895443https://dblp.org/rec/conf/hase/HeG00URL#6450673Yutao HeHerbert HechtRaymond A. PaulMeasuring and assessing software test processes using test data.HASE259-2642000Conference and Workshop Papersclosedconf/hase/HeHP0010.1109/HASE.2000.895470https://doi.org/10.1109/HASE.2000.895470https://dblp.org/rec/conf/hase/HeHP00URL#6450674Myron HechtYutao HeHerbert HechtXuegao AnIntegration of system dependability and software reliability growth models for e-commerce systems.HASE35-422000Conference and Workshop Papersclosedconf/hase/HechtHHA0010.1109/HASE.2000.895437https://doi.org/10.1109/HASE.2000.895437https://dblp.org/rec/conf/hase/HechtHHA00URL#6450675D. KapurThe use of formal methods in hardware and software cannot be abandoned.HASE142-1432000Conference and Workshop Papersclosedconf/hase/Kapur0010.1109/HASE.2000.895453https://doi.org/10.1109/HASE.2000.895453https://dblp.org/rec/conf/hase/Kapur00URL#6450676Taghi M. KhoshgoftaarRuqun ShanEdward B. AllenUsing product, process, and execution metrics to predict fault-prone software modules with classification trees.HASE301-3102000Conference and Workshop Papersclosedconf/hase/KhoshgoftaarSA0010.1109/HASE.2000.895475https://doi.org/10.1109/HASE.2000.895475https://dblp.org/rec/conf/hase/KhoshgoftaarSA00URL#6450677Roger M. KieckhaferMohammad H. AzadmaneshYongqin HuiOn the sensitivity of NMR unreliability to non-exponential repair distributions.HASE293-3002000Conference and Workshop Papersclosedconf/hase/KieckhaferAH0010.1109/HASE.2000.895474https://doi.org/10.1109/HASE.2000.895474https://dblp.org/rec/conf/hase/KieckhaferAH00URL#6450678Lawrence A. KingDo formal methods really belong in the toolbox of the practicing engineer?HASE137-1392000Conference and Workshop Papersclosedconf/hase/King0010.1109/HASE.2000.895451https://doi.org/10.1109/HASE.2000.895451https://dblp.org/rec/conf/hase/King00URL#6450679Rogério de LemosSafety analysis of an evolving software architecture.HASE159-1682000Conference and Workshop Papersclosedconf/hase/Lemos0010.1109/HASE.2000.895455https://doi.org/10.1109/HASE.2000.895455https://dblp.org/rec/conf/hase/Lemos00URL#6450680Robyn R. LutzFour areas of overlapping interest.HASE49-502000Conference and Workshop Papersclosedconf/hase/Lutz0010.1109/HASE.2000.895440https://doi.org/10.1109/HASE.2000.895440https://dblp.org/rec/conf/hase/Lutz00URL#6450681James A. McCoyAn embedded system for safe, secure and reliable execution of high consequence software.HASE107-1142000Conference and Workshop Papersclosedconf/hase/McCoy0010.1109/HASE.2000.895448https://doi.org/10.1109/HASE.2000.895448https://dblp.org/rec/conf/hase/McCoy00URL#6450682Kinji MoriAssurance system architecture for information service by utilizing autonomous mobile agents.HASE273-2802000Conference and Workshop Papersclosedconf/hase/Mori0010.1109/HASE.2000.895472https://doi.org/10.1109/HASE.2000.895472https://dblp.org/rec/conf/hase/Mori00URL#6450683Samuel PattonBryan SmithDavid DossWilliam YurcikA layered framework strategy for deploying high assurance VPNs.HASE199-2022000Conference and Workshop Papersclosedconf/hase/PattonSDY0010.1109/HASE.2000.895461https://doi.org/10.1109/HASE.2000.895461https://dblp.org/rec/conf/hase/PattonSDY00URL#6450684Antoine RequetLudovic CassetGilles GrimaudApplication of the B formal method to the proof of a type verification algorithm.HASE115-1242000Conference and Workshop Papersclosedconf/hase/RequetCG0010.1109/HASE.2000.895449https://doi.org/10.1109/HASE.2000.895449https://dblp.org/rec/conf/hase/RequetCG00URL#6450685John RushbyDisappearing formal methods.HASE95-962000Conference and Workshop Papersclosedconf/hase/Rushby0010.1109/HASE.2000.895446https://doi.org/10.1109/HASE.2000.895446https://dblp.org/rec/conf/hase/Rushby00URL#6450686D. Todd SmithTodd A. DeLongBarry W. JohnsonTed C. GirasDetermining the expected time to unsafe failure.HASE17-242000Conference and Workshop Papersclosedconf/hase/SmithDJG0010.1109/HASE.2000.895435https://doi.org/10.1109/HASE.2000.895435https://dblp.org/rec/conf/hase/SmithDJG00URL#6450687John H. StichmanEngineering ethics: principles and practical maxims.HASE3-42000Conference and Workshop Papersclosedconf/hase/Stichman0010.1109/HASE.2000.895433https://doi.org/10.1109/HASE.2000.895433https://dblp.org/rec/conf/hase/Stichman00URL#6450688John H. StichmanOn how symposia can be structured to benefit academia and industry.HASE51-522000Conference and Workshop Papersclosedconf/hase/Stichman00a10.1109/HASE.2000.895441https://doi.org/10.1109/HASE.2000.895441https://dblp.org/rec/conf/hase/Stichman00aURL#6450689Kam S. TsoAnn T. TaiLeon AlkalaiSavio N. ChauWilliam H. SandersGSU middleware architecture design.HASE212-2152000Conference and Workshop Papersclosedconf/hase/TsoTACS0010.1109/HASE.2000.895464https://doi.org/10.1109/HASE.2000.895464https://dblp.org/rec/conf/hase/TsoTACS00URL#6450690Gregory L. WickstromA flexible real-time architecture.HASE99-1062000Conference and Workshop Papersclosedconf/hase/Wickstrom0010.1109/HASE.2000.895447https://doi.org/10.1109/HASE.2000.895447https://dblp.org/rec/conf/hase/Wickstrom00URL#6450691Zhiwei Xu 0001Taghi M. KhoshgoftaarEdward B. AllenPrediction of software faults using fuzzy nonlinear regression modeling.HASE281-2902000Conference and Workshop Papersclosedconf/hase/XuKA0010.1109/HASE.2000.895473https://doi.org/10.1109/HASE.2000.895473https://dblp.org/rec/conf/hase/XuKA00URL#6450692William YurcikDavid TipperProviding guaranteed assurance to connection-oriented group communications using disjoint routing.HASE197-1982000Conference and Workshop Papersclosedconf/hase/YurcikT0010.1109/HASE.2000.895460https://doi.org/10.1109/HASE.2000.895460https://dblp.org/rec/conf/hase/YurcikT00URL#6450693Hong Zhu 0002Xudong HeConstructions of behaviour observation schemes in software testing.HASE7-162000Conference and Workshop Papersclosedconf/hase/ZhuH0010.1109/HASE.2000.895434https://doi.org/10.1109/HASE.2000.895434https://dblp.org/rec/conf/hase/ZhuH00URL#64506945th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2000), 15-17 November 2000, Albuquerque, NM, USA, ProceedingsHASEIEEE Computer Society2000Editorshipconf/hase/2000https://ieeexplore.ieee.org/xpl/conhome/7194/proceedinghttps://dblp.org/rec/conf/hase/2000URL#6479244Paul AmmannPaul E. BlackA Specification-Based Coverage Metric to Evaluate Test Sets.HASE239-2481999Conference and Workshop Papersclosedconf/hase/AmmannB9910.1109/HASE.1999.809499https://doi.org/10.1109/HASE.1999.809499https://dblp.org/rec/conf/hase/AmmannB99URL#6524126Andrea BondavalliIvan MuraIstván MajzikAutomatic Dependability Analysis for Supporting Design Decisions in UML.HASE64-741999Conference and Workshop Papersclosedconf/hase/BondavalliMM9910.1109/HASE.1999.809476https://doi.org/10.1109/HASE.1999.809476https://dblp.org/rec/conf/hase/BondavalliMM99URL#6524127Monica BrockmeyerUsing Modechart Modules for Testing Formal Specifications.HASE20-261999Conference and Workshop Papersclosedconf/hase/Brockmeyer9910.1109/HASE.1999.809471https://doi.org/10.1109/HASE.1999.809471https://dblp.org/rec/conf/hase/Brockmeyer99URL#6524128Damien CailliauRemy BellengerThe CorotInstrument's Software: Towards Intrinsically Reconfigurable Real-Time Embedded Processing Software in Space-Born Instruments.HASE75-801999Conference and Workshop Papersclosedconf/hase/CailliauB9910.1109/HASE.1999.809477https://doi.org/10.1109/HASE.1999.809477https://dblp.org/rec/conf/hase/CailliauB99URL#6524129Savio N. ChauExperience of Using COTS Components for Deep Space Missions.HASE1161999Conference and Workshop Papersclosedconf/hase/Chau9910.1109/HASE.1999.809483https://doi.org/10.1109/HASE.1999.809483https://dblp.org/rec/conf/hase/Chau99URL#6524130Tom Chen 0001Anneliese von MayrhauserAmjad HajjarCharles Anderson 0001Mehmet SahinogluHow Much Testing is Enough? Applying Stopping Rules to Behavioral Model Testing.HASE249-2561999Conference and Workshop Papersclosedconf/hase/ChenMHAS9910.1109/HASE.1999.809500https://doi.org/10.1109/HASE.1999.809500https://dblp.org/rec/conf/hase/ChenMHAS99URL#6524131Mario Dal CinGábor HuszerlKonstantinos KosmidisQuantitative Evaluation of Dependability Critical Systems Based on Guarded Statechart Models.HASE37-451999Conference and Workshop Papersclosedconf/hase/CinHK9910.1109/HASE.1999.809473https://doi.org/10.1109/HASE.1999.809473https://dblp.org/rec/conf/hase/CinHK99URL#6524132John M. CovanWhy Modern Systems Should Minimize the Use of Safety Critical Software.HASE2711999Conference and Workshop Papersclosedconf/hase/Covan9910.1109/HASE.1999.809503https://doi.org/10.1109/HASE.1999.809503https://dblp.org/rec/conf/hase/Covan99URL#6524133Barbara J. CzernyMats Per Erik HeimdahlIdentifying Domain Axioms Using Binary Decision Diagrams.HASE132-1401999Conference and Workshop Papersclosedconf/hase/CzernyH9910.1109/HASE.1999.809488https://doi.org/10.1109/HASE.1999.809488https://dblp.org/rec/conf/hase/CzernyH99URL#6524134Larry J. DaltonAn "in the limit" View.HASE2721999Conference and Workshop Papersclosedconf/hase/Dalton9910.1109/HASE.1999.809504https://doi.org/10.1109/HASE.1999.809504https://dblp.org/rec/conf/hase/Dalton99URL#6524135Ann Q. GatesPatricia J. TellerDynaMICs: An Automated and Independent Software-FaultDetection Approach.HASE11-191999Conference and Workshop Papersclosedconf/hase/GatesT9910.1109/HASE.1999.809470https://doi.org/10.1109/HASE.1999.809470https://dblp.org/rec/conf/hase/GatesT99URL#6524136Stefania GnesiDiego LatellaMieke MassinkModel Checking UML Statechart Diagrams Using JACK.HASE46-551999Conference and Workshop Papersclosedconf/hase/GnesiLM9910.1109/HASE.1999.809474https://doi.org/10.1109/HASE.1999.809474https://dblp.org/rec/conf/hase/GnesiLM99URL#6524137Diego Del GobboBojan CukicMarcello R. NapolitanoSteve M. EasterbrookFault Detectability Analysis for Requirements Validation of Fault Tolerant Systems.HASE231-2381999Conference and Workshop Papersclosedconf/hase/GobboCNE9910.1109/HASE.1999.809498https://doi.org/10.1109/HASE.1999.809498https://dblp.org/rec/conf/hase/GobboCNE99URL#6524138Steve GoddardKevin JeffayAnalyzing the Real-Time Properties of a U.S. Navy Signal Processing System.HASE141-1501999Conference and Workshop Papersclosedconf/hase/GoddardJ9910.1109/HASE.1999.809489https://doi.org/10.1109/HASE.1999.809489https://dblp.org/rec/conf/hase/GoddardJ99URL#6524139Li GongSatya DoddaSecurity Assurance Efforts in Engineering Java 2 SE (JDK 1.2).HASE89-961999Conference and Workshop Papersclosedconf/hase/GongD9910.1109/HASE.1999.809479https://doi.org/10.1109/HASE.1999.809479https://dblp.org/rec/conf/hase/GongD99URL#6524140Herbert HechtWhat are the Most Critical Challenges to Integrating High Assurance Systems?.HASE227-2301999Conference and Workshop Papersclosedconf/hase/Hecht9910.1109/HASE.1999.10005https://doi.ieeecomputersociety.org/10.1109/HASE.1999.10005https://dblp.org/rec/conf/hase/Hecht99URL#6524141Carol L. HooverJeffery P. HansenPhilip KoopmanSandeep TamboliThe Amaranth Framework: Probabilistic, Utility-Based Quality of Service Management for High-Assurance Computing.HASE207-2161999Conference and Workshop Papersclosedconf/hase/HooverHKT9910.1109/HASE.1999.809496https://doi.org/10.1109/HASE.1999.809496https://dblp.org/rec/conf/hase/HooverHKT99URL#6524142Isao KajiYongdong TanKinji MoriAutonomous Data Synchronization in Heterogeneous Systems to Assure the Transaction.HASE169-1781999Conference and Workshop Papersclosedconf/hase/KajiTM9910.1109/HASE.1999.809492https://doi.org/10.1109/HASE.1999.809492https://dblp.org/rec/conf/hase/KajiTM99URL#6524143Taghi M. KhoshgoftaarEdward B. AllenPredicting Fault-Prone Software Modules in Embedded Systems with Classification Trees.HASE105-1141999Conference and Workshop Papersclosedconf/hase/KhoshgoftaarA9910.1109/HASE.1999.809481https://doi.org/10.1109/HASE.1999.809481https://dblp.org/rec/conf/hase/KhoshgoftaarA99URL#6524144James Kirby Jr.Myla ArcherConstance L. HeitmeyerApplying Formal Methods to an Information Security Device: An Experience Report.HASE81-881999Conference and Workshop Papersclosedconf/hase/KirbyAH9910.1109/HASE.1999.809478https://doi.org/10.1109/HASE.1999.809478https://dblp.org/rec/conf/hase/KirbyAH99URL#6524145Isaac LevendelHASE in Wireless Systems.HASE1171999Conference and Workshop Papersclosedconf/hase/Levendel9910.1109/HASE.1999.809484https://doi.org/10.1109/HASE.1999.809484https://dblp.org/rec/conf/hase/Levendel99URL#6524146William E. McUmberBetty H. C. ChengUML-Based Analysis of Embedded Systems Using a Mapping to VHDL.HASE56-631999Conference and Workshop Papersclosedconf/hase/McUmberC9910.1109/HASE.1999.809475https://doi.org/10.1109/HASE.1999.809475https://dblp.org/rec/conf/hase/McUmberC99URL#6524147Raymond A. PaulAnn T. TaiBuilding High-Assurance Systems Using COTS Components: Whether, Why, When and How?HASE1151999Conference and Workshop Papersclosedconf/hase/PaulT9910.1109/HASE.1999.809482https://doi.org/10.1109/HASE.1999.809482https://dblp.org/rec/conf/hase/PaulT99URL#6524148Jennifer RenMichel CukierPaul RubelWilliam H. SandersDavid E. BakkenDavid A. KarrBuilding Dependable Distributed Applications Using AQUA.HASE189-1961999Conference and Workshop Papersclosedconf/hase/RenCRSBK9910.1109/HASE.1999.809494https://doi.org/10.1109/HASE.1999.809494https://dblp.org/rec/conf/hase/RenCRSBK99URL#6524149Lui ShaUsing COTS Software in High Assurance Control Applications.HASE1181999Conference and Workshop Papersclosedconf/hase/Sha9910.1109/HASE.1999.809485https://doi.org/10.1109/HASE.1999.809485https://dblp.org/rec/conf/hase/Sha99URL#6524150Ann T. TaiSavio N. ChauLeon AlkalaiCOTS-Based Fault Tolerance in Deep Space: Qualitative and Quantitative Analyses of a Bus Network Architecture.HASE97-1041999Conference and Workshop Papersclosedconf/hase/TaiCA9910.1109/HASE.1999.809480https://doi.org/10.1109/HASE.1999.809480https://dblp.org/rec/conf/hase/TaiCA99URL#6524151Enrico TronciFormally Modeling a Metal Processing Plant and its Closed Loop Specifications.HASE151-1601999Conference and Workshop Papersclosedconf/hase/Tronci9910.1109/HASE.1999.809490https://doi.org/10.1109/HASE.1999.809490https://dblp.org/rec/conf/hase/Tronci99URL#6524152Wei-Tek TsaiWeiguang ShaoSanjai RayadurgamJinbao LiRaymond A. PaulAssurance-Based Y2K Testing.HASE27-361999Conference and Workshop Papersclosedconf/hase/TsaiSRLP9910.1109/HASE.1999.809472https://doi.org/10.1109/HASE.1999.809472https://dblp.org/rec/conf/hase/TsaiSRLP99URL#6524153Ben L. Di VitoSoftware Can Be Entrusted with High Consequence Functionality.HASE2731999Conference and Workshop Papersclosedconf/hase/Vito9910.1109/HASE.1999.809505https://doi.org/10.1109/HASE.1999.809505https://dblp.org/rec/conf/hase/Vito99URL#6524154Jeffrey M. VoasCOTS and High Assurance: An Oxymoron?HASE119-1221999Conference and Workshop Papersclosedconf/hase/Voas9910.1109/HASE.1999.809486https://doi.org/10.1109/HASE.1999.809486https://dblp.org/rec/conf/hase/Voas99URL#6524155Jeffrey M. VoasA World Without Risks: Let Me Out!HASE274-1999Conference and Workshop Papersclosedconf/hase/Voas99a10.1109/HASE.1999.809506https://doi.org/10.1109/HASE.1999.809506https://dblp.org/rec/conf/hase/Voas99aURL#6524156Dolores R. WallaceD. Richard KuhnLessons from 342 Medical Device Failures.HASE123-1311999Conference and Workshop Papersclosedconf/hase/WallaceK9910.1109/HASE.1999.809487https://doi.org/10.1109/HASE.1999.809487https://dblp.org/rec/conf/hase/WallaceK99URL#6524157Michael W. WhalenMats Per Erik HeimdahlOn the Requirements of High-Integrity Code Generation.HASE217-2261999Conference and Workshop Papersclosedconf/hase/WhalenH9910.1109/HASE.1999.809497https://doi.org/10.1109/HASE.1999.809497https://dblp.org/rec/conf/hase/WhalenH99URL#6524158Victor L. WinterA Synchronous Paradigm for Modeling Stable Reactive Systems.HASE257-2681999Conference and Workshop Papersclosedconf/hase/Winter9910.1109/HASE.1999.809501https://doi.org/10.1109/HASE.1999.809501https://dblp.org/rec/conf/hase/Winter99URL#6524159Victor L. WinterRaymond BergSoftware Systems: Consequence versus Functionality.HASE269-2701999Conference and Workshop Papersclosedconf/hase/WinterB9910.1109/HASE.1999.809502https://doi.org/10.1109/HASE.1999.809502https://dblp.org/rec/conf/hase/WinterB99URL#6524160Alec YasinsacWilliam A. WulfA Framework for a Cryptographic Protocol Evaluation Workbench.HASE197-2061999Conference and Workshop Papersclosedconf/hase/YasinsacW9910.1109/HASE.1999.809495https://doi.org/10.1109/HASE.1999.809495https://dblp.org/rec/conf/hase/YasinsacW99URL#6524161I-Ling YenBiao ChenIng-Ray ChenReal-Time Atomic Transaction Processing Using Multi-Invariant Data Structure.HASE161-1681999Conference and Workshop Papersclosedconf/hase/YenCC9910.1109/HASE.1999.809491https://doi.org/10.1109/HASE.1999.809491https://dblp.org/rec/conf/hase/YenCC99URL#6524162Haihong ZhengSourav BhattacharyaLook-Ahead Channel Reservation and Borrowing in Cellular Network System.HASE179-1881999Conference and Workshop Papersclosedconf/hase/ZhengB9910.1109/HASE.1999.809493https://doi.org/10.1109/HASE.1999.809493https://dblp.org/rec/conf/hase/ZhengB99URL#65241634th IEEE International Symposium on High-Assurance Systems Engineering (HASE '99), 17-19 November 1999, Washington, D.C, USA, ProceedingsHASEIEEE Computer Society1999Editorshipconf/hase/1999https://ieeexplore.ieee.org/xpl/conhome/6576/proceedinghttps://dblp.org/rec/conf/hase/1999URL#6550647Manuel Aparicio IVPeter HermanWendy StephensAnuj K. JainMunindar P. SinghAgent Information Contracts within Virtual Private Networks.HASE304-3111998Conference and Workshop Papersclosedconf/hase/AparicioHSJS9810.1109/HASE.1998.731634https://doi.org/10.1109/HASE.1998.731634https://dblp.org/rec/conf/hase/AparicioHSJS98URL#6591924Kamel BarkaouiJean-François Pradat-PeyreVerification in Concurrent Programming with Petri Nets Structural Techniques.HASE124-1331998Conference and Workshop Papersclosedconf/hase/BarkaouiP9810.1109/HASE.1998.731604https://doi.org/10.1109/HASE.1998.731604https://dblp.org/rec/conf/hase/BarkaouiP98URL#6591925Mario Dal CinChecking Modification Tolerance.HASE4-121998Conference and Workshop Papersclosedconf/hase/Cin9810.1109/HASE.1998.731589https://doi.org/10.1109/HASE.1998.731589https://dblp.org/rec/conf/hase/Cin98URL#6591926David CoppitKevin J. SullivanFormal Specification in Collaborative Design of Critical Software Tools.HASE13-201998Conference and Workshop Papersclosedconf/hase/CoppitS9810.1109/HASE.1998.731590https://doi.org/10.1109/HASE.1998.731590https://dblp.org/rec/conf/hase/CoppitS98URL#6591927John M. CovanJ. Arlin CooperPredictable Safety in the Control of High Consequence Systems.HASE200-2041998Conference and Workshop Papersclosedconf/hase/CovanC9810.1109/HASE.1998.731612https://doi.org/10.1109/HASE.1998.731612https://dblp.org/rec/conf/hase/CovanC98URL#6591928Yi Deng 0001Jiacun WangIntegrated Architectural Modeling and Analysis for High-Assurance Command and Control System Design.HASE270-2781998Conference and Workshop Papersclosedconf/hase/DengW9810.1109/HASE.1998.731627https://doi.org/10.1109/HASE.1998.731627https://dblp.org/rec/conf/hase/DengW98URL#6591929Diego Del GobboMarcello R. NapolitanoJohn CallahanBojan CukicExperience in Developing System Requirements Specification for a Sensor Failure Detection and Identification Scheme.HASE209-2131998Conference and Workshop Papersclosedconf/hase/GobboNCC9810.1109/HASE.1998.731614https://doi.org/10.1109/HASE.1998.731614https://dblp.org/rec/conf/hase/GobboNCC98URL#6591930Swapna S. GokhaleKishor S. TrivediLog-Logistic Software Reliability Growth Model.HASE34-411998Conference and Workshop Papersclosedconf/hase/GokhaleT9810.1109/HASE.1998.731593https://doi.org/10.1109/HASE.1998.731593https://dblp.org/rec/conf/hase/GokhaleT98URL#6591931Fabrizio Grandoni 0002Andrea BondavalliSilvano ChiaradonnaA New Heuristic to Discriminate between Transient and Intermittent Faults.HASE224-2311998Conference and Workshop Papersclosedconf/hase/GrandoniBC9810.1109/HASE.1998.731617https://doi.org/10.1109/HASE.1998.731617https://dblp.org/rec/conf/hase/GrandoniBC98URL#6591932Hideo HanamuraKinji MoriAssurance of Transactions in Allied Heterogeneous Systems by Autonomous Decentralized System Techniques.HASE288-2951998Conference and Workshop Papersclosedconf/hase/HanamuraM9810.1109/HASE.1998.731630https://doi.org/10.1109/HASE.1998.731630https://dblp.org/rec/conf/hase/HanamuraM98URL#6591933Carol L. HooverPradeep K. KhoslaAnalytical Partition of Software Components for Evolvable and Reliable MEMS Design Tools.HASE188-1991998Conference and Workshop Papersclosedconf/hase/HooverK9810.1109/HASE.1998.731611https://doi.org/10.1109/HASE.1998.731611https://dblp.org/rec/conf/hase/HooverK98URL#6591934William E. HowdenGood Enough versus High Assurance Software Testing and Evaluation Methods.HASE166-1771998Conference and Workshop Papersclosedconf/hase/Howden9810.1109/HASE.1998.731609https://doi.org/10.1109/HASE.1998.731609https://dblp.org/rec/conf/hase/Howden98URL#6591935Seung H. HwangGwan S. ChoiOn-Chip Cache Memory Resilience.HASE240-2471998Conference and Workshop Papersclosedconf/hase/HwangC9810.1109/HASE.1998.731620https://doi.org/10.1109/HASE.1998.731620https://dblp.org/rec/conf/hase/HwangC98URL#6591936Ravishankar K. IyerZbigniew KalbarczykKeith WhisnantSaurabh BagchiA Flexible Software Architecture for High Availability Computing.HASE42-491998Conference and Workshop Papersclosedconf/hase/IyerKWB9810.1109/HASE.1998.731594https://doi.org/10.1109/HASE.1998.731594https://dblp.org/rec/conf/hase/IyerKWB98URL#6591937Gary JohnsonJohn CalvertKelly J. HayhurstJohn JaneriHerbert HechtSystem Requirements and Analysis Issues for High Assurance Systems.HASE60-1998Conference and Workshop Papersclosedconf/hase/JohnsonCHJH9810.1109/HASE.1998.10001https://doi.ieeecomputersociety.org/10.1109/HASE.1998.10001https://dblp.org/rec/conf/hase/JohnsonCHJH98URL#6591938Taghi M. KhoshgoftaarEdward B. AllenArchana NaikWendell D. JonesJohn P. HudepohlUsing Classification Trees for Software Quality Models: Lessons Learned.HASE82-891998Conference and Workshop Papersclosedconf/hase/KhoshgoftaarANJH9810.1109/HASE.1998.731598https://doi.org/10.1109/HASE.1998.731598https://dblp.org/rec/conf/hase/KhoshgoftaarANJH98URL#6591939Rajiv KhoslaHuman-Centered Virtual Machine of Problem Solving Agents, Software Agents, Intelligent Agents and Objects.HASE312-1998Conference and Workshop Papersclosedconf/hase/Khosla9810.1109/HASE.1998.731636https://doi.org/10.1109/HASE.1998.731636https://dblp.org/rec/conf/hase/Khosla98URL#6591940K. H. KimROAFTS: A Middleware Architecture for Real-Time Object-Oriented Adaptive Fault Tolerance Support.HASE50-631998Conference and Workshop Papersclosedconf/hase/Kim9810.1109/HASE.1998.731595https://doi.org/10.1109/HASE.1998.731595https://dblp.org/rec/conf/hase/Kim98URL#6591941David Chenho KungPei HsiaYasufumi ToyoshimaCris ChenJerry Gao 0002Object-Oriented Software Testing: Some Research and Development.HASE158-1651998Conference and Workshop Papersclosedconf/hase/KungHTCG9810.1109/HASE.1998.731608https://doi.org/10.1109/HASE.1998.731608https://dblp.org/rec/conf/hase/KungHTCG98URL#6591942Tei-Wei KuoYuan-Ting KaoLihChyun ShuA Two-Version Approach for Real-Time Concurrency Control and Recovery.HASE279-1998Conference and Workshop Papersclosedconf/hase/KuoKS9810.1109/HASE.1998.731628https://doi.org/10.1109/HASE.1998.731628https://dblp.org/rec/conf/hase/KuoKS98URL#6591943Ronjeet LalGwan S. ChoiError and Failure Analysis of a UNIX Server.HASE232-2391998Conference and Workshop Papersclosedconf/hase/LalC9810.1109/HASE.1998.731618https://doi.org/10.1109/HASE.1998.731618https://dblp.org/rec/conf/hase/LalC98URL#6591944Yu Lei 0001Kuo-Chung TaiIn-Parameter-Order: A Test Generation Strategy for Pairwise Testing.HASE254-2611998Conference and Workshop Papersclosedconf/hase/LeiT9810.1109/HASE.1998.731623https://doi.org/10.1109/HASE.1998.731623https://dblp.org/rec/conf/hase/LeiT98URL#6591945Yashwant K. MalaiyaJason DentonEstimating the Number of Residual Defects.HASE98-1071998Conference and Workshop Papersclosedconf/hase/MalaiyaD9810.1109/HASE.1998.731600https://doi.org/10.1109/HASE.1998.731600https://dblp.org/rec/conf/hase/MalaiyaD98URL#6591946Ragavan ManianJoanne Bechta DuganDavid CoppitKevin J. SullivanCombining Various Solution Techniques for Dynamic Fault Tree Analysis of Computer Systems.HASE21-281998Conference and Workshop Papersclosedconf/hase/ManianDCS9810.1109/HASE.1998.731591https://doi.org/10.1109/HASE.1998.731591https://dblp.org/rec/conf/hase/ManianDCS98URL#6591947Anneliese von MayrhauserAndre BaiTom Chen 0001Charles Anderson 0001Amjad HajjarFast Antirandom (FAR) Test Generation.HASE262-2691998Conference and Workshop Papersclosedconf/hase/MayrhauserBCAH9810.1109/HASE.1998.731625https://doi.org/10.1109/HASE.1998.731625https://dblp.org/rec/conf/hase/MayrhauserBCAH98URL#6591948Duane E. OlawskyCharles PayneThomas SundquistDavid ApostalTodd FineUsing Composition to Design Secure, Fault-Tolerant Systems.HASE29-331998Conference and Workshop Papersclosedconf/hase/OlawskyPSAF9810.1109/HASE.1998.731592https://doi.org/10.1109/HASE.1998.731592https://dblp.org/rec/conf/hase/OlawskyPSAF98URL#6591949Shashi PhohaEugene EberbachEileen PelusoAtilla P. KiralyCoordination of Engineering Design Agents for High Assurance in Complex Dynamic System Design.HASE296-3031998Conference and Workshop Papersclosedconf/hase/PhohaEPK9810.1109/HASE.1998.731631https://doi.org/10.1109/HASE.1998.731631https://dblp.org/rec/conf/hase/PhohaEPK98URL#6591950Michele PizzaLorenzo StriginiAndrea BondavalliFelicita Di GiandomenicoOptimal Discrimination between Transient and Permanent Faults.HASE214-2231998Conference and Workshop Papersclosedconf/hase/PizzaSBG9810.1109/HASE.1998.731615https://doi.org/10.1109/HASE.1998.731615https://dblp.org/rec/conf/hase/PizzaSBG98URL#6591951Calton PuCrispin CowanSystem Survivability through Security Bug Tolerance.HASE1081998Conference and Workshop Papersclosedconf/hase/PuC9810.1109/HASE.1998.731601https://doi.org/10.1109/HASE.1998.731601https://dblp.org/rec/conf/hase/PuC98URL#6591952Donald F. SchenkerTaghi M. KhoshgoftaarThe Application of Fuzzy Enhanced Case-Based Reasoning for Identifying Fault-Prone Modules.HASE90-971998Conference and Workshop Papersclosedconf/hase/SchenkerK9810.1109/HASE.1998.731599https://doi.org/10.1109/HASE.1998.731599https://dblp.org/rec/conf/hase/SchenkerK98URL#6591953Eltefaat ShokriHerbert HechtMatching Software Fault Tolerance with Application Needs.HASE248-2531998Conference and Workshop Papersclosedconf/hase/ShokriH9810.1109/HASE.1998.731622https://doi.org/10.1109/HASE.1998.731622https://dblp.org/rec/conf/hase/ShokriH98URL#6591954Robert N. SmithSourav BhattacharyaFault and Leak Tolerance in Firewall Engineering.HASE117-1231998Conference and Workshop Papersclosedconf/hase/SmithB9810.1109/HASE.1998.731603https://doi.org/10.1109/HASE.1998.731603https://dblp.org/rec/conf/hase/SmithB98URL#6591955Susan StepneyIncremental Development of a High Integrity Compiler: Experience from an Industrial Development.HASE142-1491998Conference and Workshop Papersclosedconf/hase/Stepney9810.1109/HASE.1998.731606https://doi.org/10.1109/HASE.1998.731606https://dblp.org/rec/conf/hase/Stepney98URL#6591956Satish SubramanianSanjai RayadurgamWei-Tek TsaiDesign for Constraint Violation Detection in Safety-Critical Systems.HASE109-1161998Conference and Workshop Papersclosedconf/hase/SubramanianRT9810.1109/HASE.1998.731602https://doi.org/10.1109/HASE.1998.731602https://dblp.org/rec/conf/hase/SubramanianRT98URL#6591957Dolores R. WallaceEnhancing Competitiveness via a Public Fault & Failure Data Repository .HASE178-1871998Conference and Workshop Papersclosedconf/hase/Wallace9810.1109/HASE.1998.731610https://doi.org/10.1109/HASE.1998.731610https://dblp.org/rec/conf/hase/Wallace98URL#6591958Farn WangPao-Ann HsiungAutomatic Verification on the Large.HASE134-1411998Conference and Workshop Papersclosedconf/hase/WangH9810.1109/HASE.1998.731605https://doi.org/10.1109/HASE.1998.731605https://dblp.org/rec/conf/hase/WangH98URL#6591959Denise M. WoitDavid V. MasonSoftware Component Independence.HASE74-811998Conference and Workshop Papersclosedconf/hase/WoitM9810.1109/HASE.1998.731597https://doi.org/10.1109/HASE.1998.731597https://dblp.org/rec/conf/hase/WoitM98URL#6591960Jun Xu 0014Mukesh SinghalA Firewalling Scheme for Securing MPOA-Based Enterprise Networks.HASE205-2081998Conference and Workshop Papersclosedconf/hase/XuS9810.1109/HASE.1998.731613https://doi.org/10.1109/HASE.1998.731613https://dblp.org/rec/conf/hase/XuS98URL#6591961Stephen J. H. YangSam LinJonathan LeeWilliam C. ChuSpecifying and Verifying Temporal Behavior of High Assurance Systems Using Reachability Tree Logic.HASE150-1571998Conference and Workshop Papersclosedconf/hase/YangLLC9810.1109/HASE.1998.731607https://doi.org/10.1109/HASE.1998.731607https://dblp.org/rec/conf/hase/YangLLC98URL#6591962Ying C. (Bob) YehDesign Considerations in Boeing 777 Fly-By-Wire Computers.HASE64-731998Conference and Workshop Papersclosedconf/hase/Yeh9810.1109/HASE.1998.731596https://doi.org/10.1109/HASE.1998.731596https://dblp.org/rec/conf/hase/Yeh98URL#65919633rd IEEE International Symposium on High-Assurance Systems Engineering (HASE '98), 13-14 November 1998, Washington, D.C, USA, ProceedingsHASEIEEE Computer Society1998Editorshipconf/hase/1998https://ieeexplore.ieee.org/xpl/conhome/5939/proceedinghttps://dblp.org/rec/conf/hase/1998URL#6615209Zeyad AlkhalifaV. S. S. NairDesign of a Portable Control-Flow Checking Technique.HASE120-1231997Conference and Workshop Papersclosedconf/hase/AlkhalifaN9710.1109/HASE.1997.648049https://doi.org/10.1109/HASE.1997.648049https://dblp.org/rec/conf/hase/AlkhalifaN97URL#6652301Guillem BernatJosé Miró-JuliàJulián ProenzaA Technique to Analyze the Tolerance to Transient Overloads of a Fault-Tolerant Real-Time System.HASE221-1997Conference and Workshop Papersclosedconf/hase/BernatMP9710.1109/HASE.1997.648070https://doi.org/10.1109/HASE.1997.648070https://dblp.org/rec/conf/hase/BernatMP97URL#6652302Andrea BondavalliIvan MuraManuela NelliAnalytical Modelling and Evaluation of Phased-Mission Systems for Space Applications.HASE85-931997Conference and Workshop Papersclosedconf/hase/BondavalliMN9710.1109/HASE.1997.648043https://doi.org/10.1109/HASE.1997.648043https://dblp.org/rec/conf/hase/BondavalliMN97URL#6652303J. BoulangerV. DelebarreStéphane NatkinJ. OzelloDeriving Safety Properties of Critical Software from the System Risk Analysis Application to Ground Transportation Systems.HASE162-1671997Conference and Workshop Papersclosedconf/hase/BoulangerDNO9710.1109/HASE.1997.648058https://doi.org/10.1109/HASE.1997.648058https://dblp.org/rec/conf/hase/BoulangerDNO97URL#6652304James M. BoyleR. Daniel ReslerVictor L. WinterDo You Trust Your Compiler? Applying Formal Methods to Constructing High-Assurance Compilers.HASE14-311997Conference and Workshop Papersclosedconf/hase/BoyleRW9710.1109/HASE.1997.648033https://doi.org/10.1109/HASE.1997.648033https://dblp.org/rec/conf/hase/BoyleRW97URL#6652305Monica BrockmeyerFarnam JahanianElly WinnerConstance L. HeitmeyerBruce G. LabawA. Software Environment for Custom Simulation and Monitoring of Real-Time Specifications.HASE78-841997Conference and Workshop Papersclosedconf/hase/BrockmeyerJWHL9710.1109/HASE.1997.648042https://doi.org/10.1109/HASE.1997.648042https://dblp.org/rec/conf/hase/BrockmeyerJWHL97URL#6652306William G. CastanedaSoftware Complexity Analysis on Department of Defense Real-Time Systems.HASE130-1331997Conference and Workshop Papersclosedconf/hase/Castaneda9710.1109/HASE.1997.648051https://doi.org/10.1109/HASE.1997.648051https://dblp.org/rec/conf/hase/Castaneda97URL#6652307Saurav ChatterjeeJaroslaw J. SydirBikash SabataThomas F. LawrenceModeling Applications for Adaptive QoS-based Resource Management.HASE194-2011997Conference and Workshop Papersclosedconf/hase/ChatterjeeSSL9710.1109/HASE.1997.648064https://doi.org/10.1109/HASE.1997.648064https://dblp.org/rec/conf/hase/ChatterjeeSSL97URL#6652308Mario Dal CinVerifying Fault-Tolerant Behavior of State Machines.HASE94-991997Conference and Workshop Papersclosedconf/hase/Cin9710.1109/HASE.1997.648044https://doi.org/10.1109/HASE.1997.648044https://dblp.org/rec/conf/hase/Cin97URL#6652309Bojan CukicCombining Testing and Correctness Verification in Software Reliability Assessment.HASE182-1871997Conference and Workshop Papersclosedconf/hase/Cukic9710.1109/HASE.1997.648061https://doi.org/10.1109/HASE.1997.648061https://dblp.org/rec/conf/hase/Cukic97URL#6652310Husni FahmiRaymond A. PaulAhmed R. BashandyArif GhafoorEnsuring Quality of Service for Multimedia Applications in a LAN Environment.HASE202-2081997Conference and Workshop Papersclosedconf/hase/FahmiPBG9710.1109/HASE.1997.648066https://doi.org/10.1109/HASE.1997.648066https://dblp.org/rec/conf/hase/FahmiPBG97URL#6652311Mehrdad HassaniDavid B. StewartA Mechanism for Communicating in Dynamically Reconfigurable Embedded Systems.HASE215-2201997Conference and Workshop Papersclosedconf/hase/HassaniS9710.1109/HASE.1997.648069https://doi.org/10.1109/HASE.1997.648069https://dblp.org/rec/conf/hase/HassaniS97URL#6652312Herbert HechtMyron HechtDolores R. WallaceToward More Effective Testing for High-Assurance Systems.HASE176-1811997Conference and Workshop Papersclosedconf/hase/HechtHW9710.1109/HASE.1997.648060https://doi.org/10.1109/HASE.1997.648060https://dblp.org/rec/conf/hase/HechtHW97URL#6652313Mats Per Erik HeimdahlVerifying Communication Constraints in RSML Specifications.HASE56-631997Conference and Workshop Papersclosedconf/hase/Heimdahl9710.1109/HASE.1997.648039https://doi.org/10.1109/HASE.1997.648039https://dblp.org/rec/conf/hase/Heimdahl97URL#6652314Anouar JamoussiAn Automated Tool for Efficiently Generating a Massive Number of Random Test Cases.HASE104-1071997Conference and Workshop Papersclosedconf/hase/Jamoussi9710.1109/HASE.1997.648046https://doi.org/10.1109/HASE.1997.648046https://dblp.org/rec/conf/hase/Jamoussi97URL#6652315Taghi M. KhoshgoftaarEdward B. AllenRobert Halstead 0001Gary P. TrioRonald M. FlassProcess Measures for Predicting Software Quality.HASE155-1611997Conference and Workshop Papersclosedconf/hase/KhoshgoftaarAHTF9710.1109/HASE.1997.648056https://doi.org/10.1109/HASE.1997.648056https://dblp.org/rec/conf/hase/KhoshgoftaarAHTF97URL#6652316K. H. KimChittur SubbaramanEltefaat ShokriHigh-Coverage Fault Tolerance in Real-Time Systems Based on Point-to-Point Communication.HASE141-1481997Conference and Workshop Papersclosedconf/hase/KimSS9710.1109/HASE.1997.648053https://doi.org/10.1109/HASE.1997.648053https://dblp.org/rec/conf/hase/KimSS97URL#6652317Minsoon KweonSoomyung ParkSangjin JoungSunyoung HanMoon-hae KimScalable and Reliable Synchronous Collaboration Environment on CORBA using WWW.HASE100-1031997Conference and Workshop Papersclosedconf/hase/KweonPJHK9710.1109/HASE.1997.648045https://doi.org/10.1109/HASE.1997.648045https://dblp.org/rec/conf/hase/KweonPJHK97URL#6652318Thomas F. LawrenceThe Quality of Service Model and High Assurance.HASE38-411997Conference and Workshop Papersclosedconf/hase/Lawrence9710.1109/HASE.1997.648036https://doi.org/10.1109/HASE.1997.648036https://dblp.org/rec/conf/hase/Lawrence97URL#6652319Insup Lee 0001Oleg SokolskyAnalytical Design of Evolutionary Control Flow Components.HASE48-551997Conference and Workshop Papersclosedconf/hase/LeeS9710.1109/HASE.1997.648038https://doi.org/10.1109/HASE.1997.648038https://dblp.org/rec/conf/hase/LeeS97URL#6652320Gilberto MatosJames M. PurtiloElizabeth L. WhiteAutomated Computation of Decomposable Synchronization Conditions.HASE72-771997Conference and Workshop Papersclosedconf/hase/MatosPW9710.1109/HASE.1997.648041https://doi.org/10.1109/HASE.1997.648041https://dblp.org/rec/conf/hase/MatosPW97URL#6652321F. MauriceAbdelmalek BenzekriYves RaynaudEvaluation and Improvement of Software Products and Processes based on Measurement.HASE108-1131997Conference and Workshop Papersclosedconf/hase/MauriceBR9710.1109/HASE.1997.648047https://doi.org/10.1109/HASE.1997.648047https://dblp.org/rec/conf/hase/MauriceBR97URL#6652322Kinji MoriHigh-Assurance Application Systems and Their Technologies Under Changing Situations.HASE168-1751997Conference and Workshop Papersclosedconf/hase/Mori9710.1109/HASE.1997.648059https://doi.org/10.1109/HASE.1997.648059https://dblp.org/rec/conf/hase/Mori97URL#6652323Edgar NettMichael MockA Recovery Model for Extended Real-Time Transactions.HASE124-1291997Conference and Workshop Papersclosedconf/hase/NettM9710.1109/HASE.1997.648050https://doi.org/10.1109/HASE.1997.648050https://dblp.org/rec/conf/hase/NettM97URL#6652324Michel RaynalA Case Study of Agreement Problems in Distributed Systems: Non-Blocking Atomic Commitment.HASE209-2141997Conference and Workshop Papersclosedconf/hase/Raynal9710.1109/HASE.1997.648067https://doi.org/10.1109/HASE.1997.648067https://dblp.org/rec/conf/hase/Raynal97URL#6652325Sandeepan SanyalViren ShahSamrat BhattacharyaFramework of a Software Reliability Engineering Tool.HASE114-1191997Conference and Workshop Papersclosedconf/hase/SanyalSB9710.1109/HASE.1997.648048https://doi.org/10.1109/HASE.1997.648048https://dblp.org/rec/conf/hase/SanyalSB97URL#6652326Robert W. SumnersJacob A. AbrahamHierarchical Specification of System Behavior.HASE134-1401997Conference and Workshop Papersclosedconf/hase/SumnersA9710.1109/HASE.1997.648052https://doi.org/10.1109/HASE.1997.648052https://dblp.org/rec/conf/hase/SumnersA97URL#6652327Ann T. TaiKishor S. TrivediHerbert HechtOn the Development of Dependability-Evaluation Workbench for High-Assurance System Designers.HASE2-131997Conference and Workshop Papersclosedconf/hase/TaiTH9710.1109/HASE.1997.648031https://doi.org/10.1109/HASE.1997.648031https://dblp.org/rec/conf/hase/TaiTH97URL#6652328Jeffrey J. P. TsaiEric Y. T. JuanEfficient Compositional State-Space Verification for Communicating Processes in Distributed Systems.HASE188-1931997Conference and Workshop Papersclosedconf/hase/TsaiJ9710.1109/HASE.1997.648062https://doi.org/10.1109/HASE.1997.648062https://dblp.org/rec/conf/hase/TsaiJ97URL#6652329Wei-Tek TsaiRamin MojdehbakhshSanjai RayadurgamExperience in Capturing Requirements for Safety-Critical Medical Devices in an Industrial Environment.HASE32-371997Conference and Workshop Papersclosedconf/hase/TsaiMR9710.1109/HASE.1997.648035https://doi.org/10.1109/HASE.1997.648035https://dblp.org/rec/conf/hase/TsaiMR97URL#6652330Kam S. TsoEltefaat ShokriRoger J. Dziegiel Jr.ReSoFT: A Reusable Testbed for Development and Evaluation of Software Fault-Tolerant Systems.HASE149-1541997Conference and Workshop Papersclosedconf/hase/TsoSD9710.1109/HASE.1997.648054https://doi.org/10.1109/HASE.1997.648054https://dblp.org/rec/conf/hase/TsoSD97URL#66523312nd High-Assurance Systems Engineering Workshop (HASE '97), August 11-12, 1997, Washington, DC, USA, ProceedingsHASEIEEE Computer Society1997Editorshipconf/hase/1997https://ieeexplore.ieee.org/xpl/conhome/5231/proceedinghttps://dblp.org/rec/conf/hase/1997URL#6672533Sanghyun AhnReal-time multicast connection establishment over ATM networks.HASE184-1971996Conference and Workshop Papersclosedconf/hase/Ahn9610.1109/HASE.1996.618592https://doi.org/10.1109/HASE.1996.618592https://dblp.org/rec/conf/hase/Ahn96URL#6707987Farokh B. BastaniBojan CukicImpact of program transformation on software reliability assessment.HASE214-2211996Conference and Workshop Papersclosedconf/hase/BastaniC9610.1109/HASE.1996.618599https://doi.org/10.1109/HASE.1996.618599https://dblp.org/rec/conf/hase/BastaniC96URL#6707988Virginia L. CastorThe Department of Defense Science and Technology (S&T) Program.HASE130-1996Conference and Workshop Papersclosedconf/hase/Castor96http://www.computer.org/csdl/proceedings/hase/1996/7629/00/76290130-abs.htmlhttps://dblp.org/rec/conf/hase/Castor96URL#6707989Shi-Kuo ChangActive Multimedia Communication Systems.HASE194-1996Conference and Workshop Papersclosedconf/hase/Chang9610.1109/HASE.1996.10002https://doi.ieeecomputersociety.org/10.1109/HASE.1996.10002https://dblp.org/rec/conf/hase/Chang96URL#6707990Jian ChenRichard H. CarverSelecting and mapping test sequences from formal specifications of concurrent programs.HASE112-1191996Conference and Workshop Papersclosedconf/hase/ChenC9610.1109/HASE.1996.618572https://doi.org/10.1109/HASE.1996.618572https://dblp.org/rec/conf/hase/ChenC96URL#6707991Scott DawsonFarnam JahanianTodd MittonFault injection experiments on real-time protocols using ORCHESTRA.HASE142-1491996Conference and Workshop Papersclosedconf/hase/DawsonJM9610.1109/HASE.1996.618576https://doi.org/10.1109/HASE.1996.618576https://dblp.org/rec/conf/hase/DawsonJM96URL#6707992José M. DrakeWriting a user functional description for an Army software metrics support tool.HASE93-1031996Conference and Workshop Papersclosedconf/hase/Drake9610.1109/HASE.1996.618570https://doi.org/10.1109/HASE.1996.618570https://dblp.org/rec/conf/hase/Drake96URL#6707993Heidrun EngelData flow transformations to detect results which are corrupted by hardware faults.HASE279-1996Conference and Workshop Papersclosedconf/hase/Engel9610.1109/HASE.1996.618609https://doi.org/10.1109/HASE.1996.618609https://dblp.org/rec/conf/hase/Engel96URL#6707994Mats Per Erik HeimdahlBarbara J. CzernyUsing PVS to analyze hierarchical state-based requirements for completeness and consistency.HASE252-2621996Conference and Workshop Papersclosedconf/hase/HeimdahlC9610.1109/HASE.1996.618606https://doi.org/10.1109/HASE.1996.618606https://dblp.org/rec/conf/hase/HeimdahlC96URL#6707995Norman E. JohnsonHigh Assurance Life and Death.HASE2-1996Conference and Workshop Papersclosedconf/hase/Johnson9610.1109/HASE.1996.10000https://doi.ieeecomputersociety.org/10.1109/HASE.1996.10000https://dblp.org/rec/conf/hase/Johnson96URL#6707996Eric Y. T. JuanJeffrey J. P. TsaiTadao MurataA new compositional method for condensed state-space verification.HASE104-1111996Conference and Workshop Papersclosedconf/hase/JuanTM9610.1109/HASE.1996.618571https://doi.org/10.1109/HASE.1996.618571https://dblp.org/rec/conf/hase/JuanTM96URL#6707997Myong H. KangJudith N. FroscherIra S. MoskowitzA framework for MLS interoperability.HASE198-2051996Conference and Workshop Papersclosedconf/hase/KangFM9610.1109/HASE.1996.618596https://doi.org/10.1109/HASE.1996.618596https://dblp.org/rec/conf/hase/KangFM96URL#6707998Thomas F. KeefeWei-Tek TsaiA multiversion transaction scheduler for centralized multilevel secure database systems.HASE206-2131996Conference and Workshop Papersclosedconf/hase/KeefeT9610.1109/HASE.1996.618597https://doi.org/10.1109/HASE.1996.618597https://dblp.org/rec/conf/hase/KeefeT96URL#6707999Taghi M. KhoshgoftaarEdward B. AllenLofton A. BullardRobert Halstead 0001Gary P. TrioA tree-based classification model for analysis of a military software system.HASE244-2511996Conference and Workshop Papersclosedconf/hase/KhoshgoftaarABHT9610.1109/HASE.1996.618605https://doi.org/10.1109/HASE.1996.618605https://dblp.org/rec/conf/hase/KhoshgoftaarABHT96URL#6708000Jyhjong LinDavid Chenho KungPei HsiaTop-down development of real-time software specification.HASE271-2781996Conference and Workshop Papersclosedconf/hase/LinKH9610.1109/HASE.1996.618608https://doi.org/10.1109/HASE.1996.618608https://dblp.org/rec/conf/hase/LinKH96URL#6708001David L. MacPhersonSpecification and Testing of High-Assurance Systems.HASE8-151996Conference and Workshop Papersclosedconf/hase/MacPherson9610.1109/HASE.1996.618555https://doi.org/10.1109/HASE.1996.618555https://dblp.org/rec/conf/hase/MacPherson96URL#6708002Takamasa NaraMasahiro NakataAkihiro OoishiSoftware reliability growth analysis-application of NHPP models and its evaluation.HASE222-2271996Conference and Workshop Papersclosedconf/hase/NaraNO9610.1109/HASE.1996.618601https://doi.org/10.1109/HASE.1996.618601https://dblp.org/rec/conf/hase/NaraNO96URL#6708003Nuno Neves 0001W. Kent FuchsAdaptive recovery for mobile environments.HASE134-1411996Conference and Workshop Papersclosedconf/hase/NevesF9610.1109/HASE.1996.618575https://doi.org/10.1109/HASE.1996.618575https://dblp.org/rec/conf/hase/NevesF96URL#6708004Raymond A. PaulM. Farrukh KhanShahab BaqaiArif GhafoorEnsuring quality in distributed multimedia systems.HASE60-671996Conference and Workshop Papersclosedconf/hase/PaulKBG9610.1109/HASE.1996.618566https://doi.org/10.1109/HASE.1996.618566https://dblp.org/rec/conf/hase/PaulKBG96URL#6708005Tolety Siva PerrajuSatyendra Pal RanaSusanta P. SarkarSpecifying fault tolerance in mission critical systems.HASE24-311996Conference and Workshop Papersclosedconf/hase/PerrajuRS9610.1109/HASE.1996.618557https://doi.org/10.1109/HASE.1996.618557https://dblp.org/rec/conf/hase/PerrajuRS96URL#6708006Ramkumar V. PichaiJoseph E. UrbanA technique for validating Booch object-oriented designs from extensions to the Descartes specification language.HASE40-491996Conference and Workshop Papersclosedconf/hase/PichaiU9610.1109/HASE.1996.618559https://doi.org/10.1109/HASE.1996.618559https://dblp.org/rec/conf/hase/PichaiU96URL#6708007Roymond S. C. ShanahanApplying engineering of computer-based systems (ECBS) and product line center (PLC) approaches to the development of mission critical systems for the Department of Defense (DoD).HASE86-921996Conference and Workshop Papersclosedconf/hase/Shanahan9610.1109/HASE.1996.618569https://doi.org/10.1109/HASE.1996.618569https://dblp.org/rec/conf/hase/Shanahan96URL#6708008Qi Shi 0001Ning ZhangA general approach to secure components composition.HASE263-2861996Conference and Workshop Papersclosedconf/hase/ShiZ9610.1109/HASE.1996.618607https://doi.org/10.1109/HASE.1996.618607https://dblp.org/rec/conf/hase/ShiZ96URL#6708009David B. StewartPradeep K. KhoslaPolicy-independent real-time operating system mechanisms for timing error detection, handling and monitoring.HASE150-1571996Conference and Workshop Papersclosedconf/hase/StewartK9610.1109/HASE.1996.618580https://doi.org/10.1109/HASE.1996.618580https://dblp.org/rec/conf/hase/StewartK96URL#6708010V. T. ThomasTen practical techniques for high assurance systems engineering.HASE55-561996Conference and Workshop Papersclosedconf/hase/Thomas9610.1109/HASE.1996.618562https://doi.org/10.1109/HASE.1996.618562https://dblp.org/rec/conf/hase/Thomas96URL#6708011Jeffrey J. P. TsaiBing LiEric Y. T. JuanTransaction integration for reusable hard real-time components.HASE166-1751996Conference and Workshop Papersclosedconf/hase/TsaiLJ9610.1109/HASE.1996.618583https://doi.org/10.1109/HASE.1996.618583https://dblp.org/rec/conf/hase/TsaiLJ96URL#6708012Ramakrishna V. VishnuvajjalaSatish SubramanianWei-Tek TsaiRamin MojdehbakhshLynn ElliottFlow analysis for concurrent, reactive, real-time systems.HASE176-1831996Conference and Workshop Papersclosedconf/hase/VishnuvajjalaSTME9610.1109/HASE.1996.618591https://doi.org/10.1109/HASE.1996.618591https://dblp.org/rec/conf/hase/VishnuvajjalaSTME96URL#6708013Ramakrishna V. VishnuvajjalaWei-Tek TsaiRamin MojdehbakhshLynn ElliottSpecifying timing constraints in real-time object-oriented systems.HASE32-391996Conference and Workshop Papersclosedconf/hase/VishnuvajjalaTME9610.1109/HASE.1996.618558https://doi.org/10.1109/HASE.1996.618558https://dblp.org/rec/conf/hase/VishnuvajjalaTME96URL#6708014Jeffrey M. VoasFrank CharronKeith W. Miller 0001Investigating rare-event failure tolerance: reductions in future uncertainty.HASE78-851996Conference and Workshop Papersclosedconf/hase/VoasCM9610.1109/HASE.1996.618568https://doi.org/10.1109/HASE.1996.618568https://dblp.org/rec/conf/hase/VoasCM96URL#6708015Victor L. WinterSoftware on the edge.HASE57-591996Conference and Workshop Papersclosedconf/hase/Winter9610.1109/HASE.1996.618565https://doi.org/10.1109/HASE.1996.618565https://dblp.org/rec/conf/hase/Winter96URL#6708016Victor L. WinterJames M. BoyleProving refinement transformations for deriving high-assurance software.HASE68-771996Conference and Workshop Papersclosedconf/hase/WinterB9610.1109/HASE.1996.618567https://doi.org/10.1109/HASE.1996.618567https://dblp.org/rec/conf/hase/WinterB96URL#6708017I-Ling YenComputer security: the good, the bad and the ugly.HASE52-531996Conference and Workshop Papersclosedconf/hase/Yen9610.1109/HASE.1996.618561https://doi.org/10.1109/HASE.1996.618561https://dblp.org/rec/conf/hase/Yen96URL#6708018Richard YuReliability prediction method for electronic systems: a comparative reliability assessment method.HASE237-2431996Conference and Workshop Papersclosedconf/hase/Yu9610.1109/HASE.1996.618603https://doi.org/10.1109/HASE.1996.618603https://dblp.org/rec/conf/hase/Yu96URL#67080191st High-Assurance Systems Engineering Workshop (HASE '96), October 22, 1996, Niagara, Canada, ProceedingsHASEIEEE Computer Society1996Editorshipconf/hase/1996https://ieeexplore.ieee.org/xpl/conhome/4888/proceedinghttps://dblp.org/rec/conf/hase/1996URL#6725528